Internal knowledge share on SSH setup and usage. Includes some helpful config file options to save time and how to create and use SSH keys for better security and productivity.
A simple presentation oof basic SSH usage possibility with full fonctionnal samples.
http://www.jmrenouard.fr/sshcookbook/#/
This document provides instructions for setting up SSH keys on CentOS 7 to enable passwordless login. It describes generating an RSA key pair with ssh-keygen, setting permissions on the private and public key files, and copying the public key to authorized_keys on the server. Running ssh-copy-id copies the public key and allows logging into the server without a password by authenticating with the private key.
Webinar: Automate IBM Connections Installations and morepanagenda
IBM Connections pink is based on Conductor for Containers, which provides a collection of tools to work with Docker containers and Kubernetes. To manage containers in large environments, lots of DevOps are using Ansible (an agentless software to automate administration tasks).
So why not use these tools to prepare your Connections operating system, like creating users, adding security settings or install all necessary packages to deploy DB2, Installation Manager, and WebSphere Application Server? Or use one of the available roles or tasks to automate even the installation of WebSphere, create cell and profiles …
In this session, you get the basics of Ansible and some hands-on to start the learning journey into ‘cloud’ based software management.
The Raspberry Pi is a series of credit card–sized single-board computers developed in the UK by the Raspberry Pi Foundation with the intention of promoting the teaching of basic computer science in schools.
The original Raspberry Pi and Raspberry Pi 2 are manufactured in several board configurations through licensed manufacturing agreements with Newark element14 (Premier Farnell), RS Components and Egoman. These companies sell the Raspberry Pi online. Egoman produces a version for distribution solely in China and Taiwan, which can be distinguished from other Pis by their red colouring and lack of FCC/CE marks. The hardware is the same across all manufacturers.
The original Raspberry Pi is based on the Broadcom BCM2835 system on a chip (SoC), which includes an ARM1176JZF-S 700 MHz processor, VideoCore IV GPU, and was originally shipped with 256 megabytes of RAM, later upgraded (models B and B+) to 512 MB. The system has Secure Digital (SD) (models A and B) or MicroSD (models A+ and B+) sockets for boot media and persistent storage.
Nagios Conference 2013 - Leland Lammert - Nagios in a Multi-Platform EnviornmentNagios
Leland Lammert's presentation on Nagios in a Multi-Platform Enviornment.
The presentation was given during the Nagios World Conference North America held Sept 20-Oct 2nd, 2013 in Saint Paul, MN. For more information on the conference (including photos and videos), visit: http://go.nagios.com/nwcna
OpenSSL Secure Sockets Layer (SSL) is a protocol for secure transmission of private documents over the Internet. It uses public/private key encryption and is often used by websites to securely obtain sensitive user information like credit card numbers. URLs using SSL start with "https://" instead of "http://". The Apache HTTP Server is the most popular web server software, known for its role in the early growth of the World Wide Web. It has configurable security and authentication features and is supported by graphical interfaces for easier configuration.
Hammr Project Update: Machine Images and Docker Containers for your Cloud, OW...OW2
Hammr is an OW2 open source, command-line tool for creating consistent and repeatable machine images for different cloud or virtual environments, or migrating live systems from one environment to another. Designed for cloud era environments, where agility and automation are key, hammr helps organizations automate the creation of machine images for hybrid environments. This presentation will focus on the hybrid capabilities of hammr for any virtual or cloud target environment. It will also include a focus on DevOps and Docker integration, and show how hammr can be used to quickly build and run Docker images, helping accelerate development and test processes among other benefits. Finally, we will present the latest hammr features, including the ability for cloud providers to customize target platforms and expose their own IaaS infrastructure as top-level branded objects accessible via hammr, thus easing the path from user images to their cloud infrastructure.
Conf2015 d waddle_defense_pointsecurity_deploying_splunksslbestpracticesBrentMatlock
This document provides best practices for securing Splunk configurations with SSL. It discusses Splunk's default SSL posture and the types of communication that can be encrypted with SSL. The document then provides recommendations for enabling SSL for various Splunk components like Splunkweb, forwarders, indexers, the deployment server, and more. It also discusses options for using a commercial or private certificate authority and provides an example SSL-enabled Splunk architecture.
The document discusses configuring Apache web server to use HTTPS (HTTP Secure) on Linux. It involves installing Apache, creating a virtual host configuration file for HTTPS that listens on port 443, enabling the SSL and HTTPS modules, generating an SSL certificate, and restarting Apache to enable secure communication over port 443 using HTTPS.
A very practical discussion on how to connect Asterisk with Relational Databases using ODBC database abstraction layer. This session will cover the basics of MySQL/ODBC installation, configuration and integration with Asterisk.
Additionally will be made practical examples about the benefits of this union: improving dialplan with SQL Queries, store Call Detail Records (CDR) in DB, implementing Realtime Architecture (ARA).
Proposed session is for those who do not yet know benefits of connecting an Asterisk box to a database or are interested to learn about it through a very simple step-by-step demo.
SSHFP records provide a secure method of distributing host public keys via DNS. The document discusses:
1) How SSHFP records store the fingerprint of a host's public key in DNS, allowing clients to validate the key via DNS lookup rather than trusting the host directly.
2) Instructions for generating SSHFP records for network devices that may not support all SSH commands, including extracting public keys and generating fingerprints.
3) Configuration details for distributing the SSHFP records in DNS and validating them during SSH connections using DNSSEC, avoiding the need to manually accept host keys.
SSHFP records provide a secure method of distributing host public keys via DNS. The document discusses:
1) How SSHFP records store fingerprints of host public keys in DNS to validate connections, rather than distributing keys directly.
2) The process of generating fingerprints from router public keys, creating SSHFP records, and configuring DNS to distribute them securely via DNSSEC.
3) How an SSH client can validate connections to a host by looking up its SSHFP records and fingerprints in DNS, preventing man-in-the-middle attacks.
What's Docker Security?
Let's investigate swiftly what security really means when we look at the container stack: client tooling, docker host, docker images and the application running on it.
This can be used as a reference when hardening your Docker ecosystem.
This was initially written for the Docker Meetup at 19/03/2019 Antwerp.
1. The document discusses TLS session resumption across multiple servers using ngx_lua. It introduces TLS handshakes and session resumption.
2. It describes how ngx_lua can implement cross-host session resumption via session IDs and tickets through Lua scripts while maintaining performance and forward secrecy. Small patches are needed to Nginx/OpenSSL.
3. Key aspects covered are a memcached session store interface, non-blocking I/O, ticket key encryption and rotation, and configuration via Lua scripts without modifying Nginx core. This allows cross-host session resumption compatible with TLSv1.3.
Codetainer: a Docker-based browser code 'sandbox'Jen Andre
Codetainer is a browser-based sandbox for running Docker containers. It allows users to "try 'X' in your browser" for any X by running Docker containers in an isolated and programmable manner directly in the browser. Codetainer uses Docker APIs to launch and manage lightweight containers via a Go-based API server. Users can create and register Docker images, launch "codetainers" from those images, and interact with the codetainers through the browser via websockets, viewing terminals and sending keystrokes. Codetainer aims to provide a secure and flexible environment for use cases like tutorials, training, and remote management while addressing challenges around container introspection and security.
The document provides instructions for configuring Red Hat Enterprise Linux 5 on VMware before installing Oracle 11gR2. This includes installing additional packages, modifying configuration files, creating users and filesystem directories, and preparing the system. Key steps are installing VMware tools, configuring network interfaces, formatting shared storage, installing the Oracle ASM library driver, and modifying shell profiles for the Oracle software owners. The goal is to prepare a system with a primary node "tom" and failover node "jerry" that is ready for an Oracle Grid 11gR2 installation.
This document provides instructions for installing Spark 2.0 on a Linux system using Cloudera's pre-built Spark jar file. It includes downloading the jar file, copying it to the correct directory, setting permissions, and restarting services to make Spark available. Additionally, it shows how to install Oracle Java JDK 1.8 by downloading the tar file, extracting it, setting it as the default Java version, and verifying the installation.
Mining Ruby Gem vulnerabilities for Fun and No Profit.Larry Cashdollar
The document discusses mining Ruby gems for vulnerabilities. It describes how the author downloaded Ruby gems from an online repository, examined the code for vulnerabilities like command injection and exposed credentials, documented findings, and sought to automate and crowdsource the process. Issues encountered included a large number of false positives and lack of response from gem authors. The author proposes expanding the approach to other programming languages and libraries.
Installation of Subversion on Ubuntu,...wensheng wei
The document provides instructions for installing Subversion on Ubuntu with Apache, SSL, and BasicAuth to allow hosting SVN repositories on a web server, including installing necessary packages, configuring Apache with a SSL certificate and virtual host, creating repositories under /var/svn, setting up authentication using htpasswd, and enabling WebDAV and SVN support in Apache.
The document discusses several steps to harden the security of a Linux server:
1. Create a firewall script to block unwanted traffic and allow only necessary ports like HTTP, HTTPS, SSH. This script is configured as an init script to run at startup.
2. Modify the SSH configuration to change the port from 22 to a non-standard high port, disable root login, and allow only a single restricted user for SSH access.
3. Install Fail2ban and DDoS Deflate tools to prevent brute force attacks and denial of service attempts by automatically blocking offending IP addresses.
The document discusses various techniques for monitoring and reporting in Asterisk, including logs, CDRs, queue logs, CEL, and AMI. It provides an overview and examples of each technique. The presentation was given by Nicolas Gudino at the 4K Conference in Buenos Aires in 2011.
This document provides instructions for connecting to Active Directory from Windows PowerShell. It includes prerequisites like having AD installed and configuring firewall ports. The script imports the Active Directory module, connects to AD using credentials, and lists attributes of the "administrator" user if connection is successful. When run, the script prompts for username and password and outputs whether connection was successful or not. If connected, it lists attributes of the specified AD user.
This document provides an overview and summary of Redis, including:
1. Redis is an open source, in-memory key-value database that can persist to disk, with data types like strings, lists, sets, and ordered sets. It supports master-slave replication and various languages.
2. Redis performance was tested at 110,000 writes/sec and 81,000 reads/sec under 50 concurrent requests with strings of 256 bytes.
3. Redis features include sharding, master-slave replication, virtual memory, and AOF persistence. It supports various data types including strings, lists, sets, sorted sets with common operations.
Metasploit magic the dark coners of the frameworkRob Fuller
The document discusses installing and using the Metasploit framework. It describes the directory structure of Metasploit and provides examples of using resource scripts to automate attacks across multiple targets using the psexec module and Ruby scripts. Additional tips mentioned include using the gui and color options in Metasploit.
Przemysław Iwanek - ABC AWS, budowanie infrastruktury przy pomocy Terraformjzielinski_pl
This document provides an overview of Terraform, an open source tool for building, changing, and versioning infrastructure safely and efficiently. It discusses key features like being declarative, idempotent and supporting automation. The document then demonstrates how to use Terraform to deploy AWS infrastructure including a VPC, security groups, EC2 instance and more. It also shows how to execute Chef recipes during deployment.
The document summarizes a workshop on dynamic content filtering using Views in Drupal. It introduces Views and how it works, using examples to build queries and display content differently. It also provides information on the speaker and his company PantaRei Design, which offers Drupal services and support.
Conf2015 d waddle_defense_pointsecurity_deploying_splunksslbestpracticesBrentMatlock
This document provides best practices for securing Splunk configurations with SSL. It discusses Splunk's default SSL posture and the types of communication that can be encrypted with SSL. The document then provides recommendations for enabling SSL for various Splunk components like Splunkweb, forwarders, indexers, the deployment server, and more. It also discusses options for using a commercial or private certificate authority and provides an example SSL-enabled Splunk architecture.
The document discusses configuring Apache web server to use HTTPS (HTTP Secure) on Linux. It involves installing Apache, creating a virtual host configuration file for HTTPS that listens on port 443, enabling the SSL and HTTPS modules, generating an SSL certificate, and restarting Apache to enable secure communication over port 443 using HTTPS.
A very practical discussion on how to connect Asterisk with Relational Databases using ODBC database abstraction layer. This session will cover the basics of MySQL/ODBC installation, configuration and integration with Asterisk.
Additionally will be made practical examples about the benefits of this union: improving dialplan with SQL Queries, store Call Detail Records (CDR) in DB, implementing Realtime Architecture (ARA).
Proposed session is for those who do not yet know benefits of connecting an Asterisk box to a database or are interested to learn about it through a very simple step-by-step demo.
SSHFP records provide a secure method of distributing host public keys via DNS. The document discusses:
1) How SSHFP records store the fingerprint of a host's public key in DNS, allowing clients to validate the key via DNS lookup rather than trusting the host directly.
2) Instructions for generating SSHFP records for network devices that may not support all SSH commands, including extracting public keys and generating fingerprints.
3) Configuration details for distributing the SSHFP records in DNS and validating them during SSH connections using DNSSEC, avoiding the need to manually accept host keys.
SSHFP records provide a secure method of distributing host public keys via DNS. The document discusses:
1) How SSHFP records store fingerprints of host public keys in DNS to validate connections, rather than distributing keys directly.
2) The process of generating fingerprints from router public keys, creating SSHFP records, and configuring DNS to distribute them securely via DNSSEC.
3) How an SSH client can validate connections to a host by looking up its SSHFP records and fingerprints in DNS, preventing man-in-the-middle attacks.
What's Docker Security?
Let's investigate swiftly what security really means when we look at the container stack: client tooling, docker host, docker images and the application running on it.
This can be used as a reference when hardening your Docker ecosystem.
This was initially written for the Docker Meetup at 19/03/2019 Antwerp.
1. The document discusses TLS session resumption across multiple servers using ngx_lua. It introduces TLS handshakes and session resumption.
2. It describes how ngx_lua can implement cross-host session resumption via session IDs and tickets through Lua scripts while maintaining performance and forward secrecy. Small patches are needed to Nginx/OpenSSL.
3. Key aspects covered are a memcached session store interface, non-blocking I/O, ticket key encryption and rotation, and configuration via Lua scripts without modifying Nginx core. This allows cross-host session resumption compatible with TLSv1.3.
Codetainer: a Docker-based browser code 'sandbox'Jen Andre
Codetainer is a browser-based sandbox for running Docker containers. It allows users to "try 'X' in your browser" for any X by running Docker containers in an isolated and programmable manner directly in the browser. Codetainer uses Docker APIs to launch and manage lightweight containers via a Go-based API server. Users can create and register Docker images, launch "codetainers" from those images, and interact with the codetainers through the browser via websockets, viewing terminals and sending keystrokes. Codetainer aims to provide a secure and flexible environment for use cases like tutorials, training, and remote management while addressing challenges around container introspection and security.
The document provides instructions for configuring Red Hat Enterprise Linux 5 on VMware before installing Oracle 11gR2. This includes installing additional packages, modifying configuration files, creating users and filesystem directories, and preparing the system. Key steps are installing VMware tools, configuring network interfaces, formatting shared storage, installing the Oracle ASM library driver, and modifying shell profiles for the Oracle software owners. The goal is to prepare a system with a primary node "tom" and failover node "jerry" that is ready for an Oracle Grid 11gR2 installation.
This document provides instructions for installing Spark 2.0 on a Linux system using Cloudera's pre-built Spark jar file. It includes downloading the jar file, copying it to the correct directory, setting permissions, and restarting services to make Spark available. Additionally, it shows how to install Oracle Java JDK 1.8 by downloading the tar file, extracting it, setting it as the default Java version, and verifying the installation.
Mining Ruby Gem vulnerabilities for Fun and No Profit.Larry Cashdollar
The document discusses mining Ruby gems for vulnerabilities. It describes how the author downloaded Ruby gems from an online repository, examined the code for vulnerabilities like command injection and exposed credentials, documented findings, and sought to automate and crowdsource the process. Issues encountered included a large number of false positives and lack of response from gem authors. The author proposes expanding the approach to other programming languages and libraries.
Installation of Subversion on Ubuntu,...wensheng wei
The document provides instructions for installing Subversion on Ubuntu with Apache, SSL, and BasicAuth to allow hosting SVN repositories on a web server, including installing necessary packages, configuring Apache with a SSL certificate and virtual host, creating repositories under /var/svn, setting up authentication using htpasswd, and enabling WebDAV and SVN support in Apache.
The document discusses several steps to harden the security of a Linux server:
1. Create a firewall script to block unwanted traffic and allow only necessary ports like HTTP, HTTPS, SSH. This script is configured as an init script to run at startup.
2. Modify the SSH configuration to change the port from 22 to a non-standard high port, disable root login, and allow only a single restricted user for SSH access.
3. Install Fail2ban and DDoS Deflate tools to prevent brute force attacks and denial of service attempts by automatically blocking offending IP addresses.
The document discusses various techniques for monitoring and reporting in Asterisk, including logs, CDRs, queue logs, CEL, and AMI. It provides an overview and examples of each technique. The presentation was given by Nicolas Gudino at the 4K Conference in Buenos Aires in 2011.
This document provides instructions for connecting to Active Directory from Windows PowerShell. It includes prerequisites like having AD installed and configuring firewall ports. The script imports the Active Directory module, connects to AD using credentials, and lists attributes of the "administrator" user if connection is successful. When run, the script prompts for username and password and outputs whether connection was successful or not. If connected, it lists attributes of the specified AD user.
This document provides an overview and summary of Redis, including:
1. Redis is an open source, in-memory key-value database that can persist to disk, with data types like strings, lists, sets, and ordered sets. It supports master-slave replication and various languages.
2. Redis performance was tested at 110,000 writes/sec and 81,000 reads/sec under 50 concurrent requests with strings of 256 bytes.
3. Redis features include sharding, master-slave replication, virtual memory, and AOF persistence. It supports various data types including strings, lists, sets, sorted sets with common operations.
Metasploit magic the dark coners of the frameworkRob Fuller
The document discusses installing and using the Metasploit framework. It describes the directory structure of Metasploit and provides examples of using resource scripts to automate attacks across multiple targets using the psexec module and Ruby scripts. Additional tips mentioned include using the gui and color options in Metasploit.
Przemysław Iwanek - ABC AWS, budowanie infrastruktury przy pomocy Terraformjzielinski_pl
This document provides an overview of Terraform, an open source tool for building, changing, and versioning infrastructure safely and efficiently. It discusses key features like being declarative, idempotent and supporting automation. The document then demonstrates how to use Terraform to deploy AWS infrastructure including a VPC, security groups, EC2 instance and more. It also shows how to execute Chef recipes during deployment.
The document summarizes a workshop on dynamic content filtering using Views in Drupal. It introduces Views and how it works, using examples to build queries and display content differently. It also provides information on the speaker and his company PantaRei Design, which offers Drupal services and support.
Drupal Security Basics for the DrupalJax January MeetupChris Hales
Basic security presentation for the Jacksonville, FL Drupal user group on how Drupal deals with the OWASP top 10 security risks of 2013.
I'l be expanding this to include additional details and examples in the next version.
DrupalCon Chicago 2011 was discussed. Key topics included Drupal 8, which Dries opened the development branch for just after his keynote. Competition with larger companies like Pantheon, Acquia DevCloud, and BlackMesh providing Drupal hosting services was also a topic. The potential for a Drupal App Store to provide additional Drupal applications was another concept that many saw as an upcoming trend.
Presented at Drupal Camp Chicago 2012
Michelle Krejci details how Promet has used Jenkins, PHPUnit, and Selenium to automate our current continuous integration process so you can begin to start automating your QA testing today. She then outlines how Promet has begun to also include Phing and Chef to run PHPUnit tests on custom modules as part of test driven development. Finally, she looks at the challenges to running user acceptance tests on a Drupal installation and moving the Drupal community away from SimpleTest towards PHPUnit testing.
In short, this is an overview of what works, what doesn't, and why this is important to the Drupal community.
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
If your B2B blogging goals include earning social media shares and backlinks to boost your search rankings, this infographic lists the size best approaches.
SSH is a secure network protocol that allows remote access and file transfers between computers in a secure manner. It uses cryptographic keys and algorithms to authenticate users and encrypt data. Some common uses of SSH include remote login and command-line execution. An SSH client initiates an encrypted connection to an SSH server on a remote computer using the secure shell protocol after verifying authentication via keys or passwords. The document then provides examples of SSH commands and configurations for tasks like connecting to remote machines, transferring files, and running commands securely over SSH connections.
SSH or secure shell is an encrypted protocol used to communicate and administer with the servers. It follows simple steps to generate on ubuntu. Generating ssh keys in ubuntu, the windows operating system is moreover similar.
This document provides an overview of SSH (Secure Shell), including how to connect to servers securely, generate and use SSH keys to avoid password typing, execute commands and scripts remotely, transfer files over SSH, and use SSH for port forwarding and multiple host management. It also lists several useful SSH-related scripts and projects for tasks like massive remote execution, SSH management, and using SSH as a VPN solution.
The document provides an overview of SSH (Secure Shell), including what it is, its history and architecture, how to install and configure it, use public-key authentication and agent forwarding, and set up port forwarding tunnels. SSH allows securely executing commands, transferring files, and accessing systems behind firewalls.
This document provides an overview of secure shell (SSH) including what it does and does not do, its system architecture, key components like SSH-TRANS, SSH-AUTH and SSH-CONN, and the process of building an SSH connection. It also discusses setting up SSH keys, copying keys to servers, using SSH agents, key scanning tools and other SSH tools. While the document discusses decrypting SSH traffic by disabling encryption, it notes this is not possible with OpenSSH and provides an alternative high performance SSH client that allows decryption. It concludes by providing credits and soliciting questions.
SSH (Secure SHell) is a protocol and program used to securely access remote systems. It allows establishing secure communication channels and relies on cryptography. Basic usage provides shell access or executes commands on remote servers, while advanced uses include transferring data, connecting to services, and creating secure tunnels through the public internet. Authentication can be done with passwords or public-key cryptography for increased security.
This document discusses OpenSSH and provides tricks for using SSH. It begins by explaining what SSH is and why it is important for secure remote access. It then discusses installing OpenSSH and basic SSH usage like remote login. The document covers additional SSH features like executing commands remotely, file transfers using SCP and SFTP, public key authentication, and default configuration files. It provides examples of SSH port forwarding, comparing remote and local files, and mounting remote folders. The document concludes with a list of "best SSH tricks" including enabling password-less login and starting tunnels.
The document discusses secure shell (SSH) and how penetration testers can use it. It covers SSH clients like PuTTY and commands like scp. It describes SSH authentication methods including passwords and public key authentication. It also discusses hardening the SSH daemon, SSH tunneling, X11 tunneling, SSH agents, and concludes that SSH can be made secure but still has vulnerabilities that pen testers should test for with permission.
This document discusses various SSH techniques including creating SSH tunnels with -L to access services on remote networks, using -D to create a quick web proxy, copying files between remote hosts with -R, generating and managing SSH keys with ssh-keygen and ssh-agent, and configuring SSH forwarding and the ~/.ssh/config file. It also covers best practices for SSH key security and management.
1. The document discusses SSH tricks and configuration tips for securing SSH connections and servers. It provides examples of SSH client-side one-liners and ways to quickly set up an SSH server.
2. SSH is a secure network protocol for exchanging data between networked devices. The document outlines ways to lock down SSH servers and clients through configuration files and access controls.
3. The document shows examples of SSH port forwarding, tunnels, and other one-liners that can enable remote access or administration through SSH connections.
Kyle Young presents on SSH tricks and configuration tips. He discusses the history and uses of SSH, how to securely connect to SSH servers by verifying fingerprints, and ways to lock down SSH servers and clients through configuration files like sshd_config and ssh_config. He also shares some useful SSH client-side one-liners.
Secure Shell (SSH) is a cryptographic network protocol for secure data communication and remote shell services over an insecure network. SSH establishes an encrypted connection between a client and server, allowing for secure login, file transfer, port forwarding and tunneling. It uses public-key authentication and encryption to securely handle remote login and other network services between two networked computers.
This document provides instructions for configuring remote access and secure file transfers using OpenSSH on CentOS 5. It describes how to configure SSH for password-less authentication using public key authentication. It also explains how to optionally rebuild OpenSSH 5.4p1 to enable additional access restrictions and features. Scripts are provided to help administer user accounts and setup file structure for hosting users.
SSH is a secure network protocol that encrypts data in transit. It uses public-key cryptography to authenticate servers and establish encrypted connections. SSH clients connect to SSH servers to securely execute commands, transfer files, and access services over unsecured networks like the Internet. Common uses of SSH include secure remote login, file transfer, port forwarding, and tunneling other protocols through an encrypted SSH connection.
This document provides steps to install and configure mod_ssl on CentOS/Fedora/Redhat to enable HTTPS on the Apache web server. It describes generating a self-signed certificate, editing the ssl.conf and httpd.conf configuration files to specify the certificate details and enable SSL, and restarting the Apache server to apply the changes.
The document discusses various security issues and best practices for writing secure PHP applications, including:
1. Validating all user inputs, using prepared statements to prevent SQL injection, and disabling register_globals and magic quotes.
2. Properly configuring PHP error messages, file permissions, and directory listings to prevent information disclosure.
3. Using strong hashing with salts to securely store passwords, disabling dangerous PHP functions, preventing XSS and CSRF attacks, and being generally paranoid about security.
SSH (Secure SHell) is a secure protocol for connecting remotely to servers. The document discusses SSH and provides instructions for its installation and basic usage. It describes how SSH establishes an encrypted tunnel using asymmetric keys for authentication. The summary also outlines how SSH can be used to securely transfer files and synchronize version control repositories.
Setting up github and ssh keys:
GitHub offers a convenient SSH key feature for accessing your repositories on the command line. Instead of using usernames and passwords every time you push to or pull from your repository, you can use your key. In this article we’ll learn how to add SSH keys to your GitHub account.
Why use an SSH key?
Using an SSH key is a convenient and secure way to access your account. It’s convenient because you don’t need to remember a long password. And you can make your actual password so brutally long and secure that no human or bot could guess it. The SSH key works like an actual key that only you possess.
https://www.freecodecamp.org/news/git-ssh-how-to/
HCL Nomad Web – Best Practices and Managing Multiuser Environmentspanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-nomad-web-best-practices-and-managing-multiuser-environments/
HCL Nomad Web is heralded as the next generation of the HCL Notes client, offering numerous advantages such as eliminating the need for packaging, distribution, and installation. Nomad Web client upgrades will be installed “automatically” in the background. This significantly reduces the administrative footprint compared to traditional HCL Notes clients. However, troubleshooting issues in Nomad Web present unique challenges compared to the Notes client.
Join Christoph and Marc as they demonstrate how to simplify the troubleshooting process in HCL Nomad Web, ensuring a smoother and more efficient user experience.
In this webinar, we will explore effective strategies for diagnosing and resolving common problems in HCL Nomad Web, including
- Accessing the console
- Locating and interpreting log files
- Accessing the data folder within the browser’s cache (using OPFS)
- Understand the difference between single- and multi-user scenarios
- Utilizing Client Clocking
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxAnoop Ashok
In today's fast-paced retail environment, efficiency is key. Every minute counts, and every penny matters. One tool that can significantly boost your store's efficiency is a well-executed planogram. These visual merchandising blueprints not only enhance store layouts but also save time and money in the process.
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Aqusag Technologies
In late April 2025, a significant portion of Europe, particularly Spain, Portugal, and parts of southern France, experienced widespread, rolling power outages that continue to affect millions of residents, businesses, and infrastructure systems.
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025BookNet Canada
Book industry standards are evolving rapidly. In the first part of this session, we’ll share an overview of key developments from 2024 and the early months of 2025. Then, BookNet’s resident standards expert, Tom Richardson, and CEO, Lauren Stewart, have a forward-looking conversation about what’s next.
Link to recording, transcript, and accompanying resource: https://bnctechforum.ca/sessions/standardsgoals-for-2025-standards-certification-roundup/
Presented by BookNet Canada on May 6, 2025 with support from the Department of Canadian Heritage.
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell
With expertise in data architecture, performance tracking, and revenue forecasting, Andrew Marnell plays a vital role in aligning business strategies with data insights. Andrew Marnell’s ability to lead cross-functional teams ensures businesses achieve sustainable growth and operational excellence.
Role of Data Annotation Services in AI-Powered ManufacturingAndrew Leo
From predictive maintenance to robotic automation, AI is driving the future of manufacturing. But without high-quality annotated data, even the smartest models fall short.
Discover how data annotation services are powering accuracy, safety, and efficiency in AI-driven manufacturing systems.
Precision in data labeling = Precision on the production floor.
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersToradex
Toradex brings robust Linux support to SMARC (Smart Mobility Architecture), ensuring high performance and long-term reliability for embedded applications. Here’s how:
• Optimized Torizon OS & Yocto Support – Toradex provides Torizon OS, a Debian-based easy-to-use platform, and Yocto BSPs for customized Linux images on SMARC modules.
• Seamless Integration with i.MX 8M Plus and i.MX 95 – Toradex SMARC solutions leverage NXP’s i.MX 8 M Plus and i.MX 95 SoCs, delivering power efficiency and AI-ready performance.
• Secure and Reliable – With Secure Boot, over-the-air (OTA) updates, and LTS kernel support, Toradex ensures industrial-grade security and longevity.
• Containerized Workflows for AI & IoT – Support for Docker, ROS, and real-time Linux enables scalable AI, ML, and IoT applications.
• Strong Ecosystem & Developer Support – Toradex offers comprehensive documentation, developer tools, and dedicated support, accelerating time-to-market.
With Toradex’s Linux support for SMARC, developers get a scalable, secure, and high-performance solution for industrial, medical, and AI-driven applications.
Do you have a specific project or application in mind where you're considering SMARC? We can help with Free Compatibility Check and help you with quick time-to-market
For more information: https://www.toradex.com/computer-on-modules/smarc-arm-family
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxshyamraj55
We’re bringing the TDX energy to our community with 2 power-packed sessions:
🛠️ Workshop: MuleSoft for Agentforce
Explore the new version of our hands-on workshop featuring the latest Topic Center and API Catalog updates.
📄 Talk: Power Up Document Processing
Dive into smart automation with MuleSoft IDP, NLP, and Einstein AI for intelligent document workflows.
Generative Artificial Intelligence (GenAI) in BusinessDr. Tathagat Varma
My talk for the Indian School of Business (ISB) Emerging Leaders Program Cohort 9. In this talk, I discussed key issues around adoption of GenAI in business - benefits, opportunities and limitations. I also discussed how my research on Theory of Cognitive Chasms helps address some of these issues
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveScyllaDB
Want to learn practical tips for designing systems that can scale efficiently without compromising speed?
Join us for a workshop where we’ll address these challenges head-on and explore how to architect low-latency systems using Rust. During this free interactive workshop oriented for developers, engineers, and architects, we’ll cover how Rust’s unique language features and the Tokio async runtime enable high-performance application development.
As you explore key principles of designing low-latency systems with Rust, you will learn how to:
- Create and compile a real-world app with Rust
- Connect the application to ScyllaDB (NoSQL data store)
- Negotiate tradeoffs related to data modeling and querying
- Manage and monitor the database for consistently low latencies
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul
Artificial intelligence is changing how businesses operate. Companies are using AI agents to automate tasks, reduce time spent on repetitive work, and focus more on high-value activities. Noah Loul, an AI strategist and entrepreneur, has helped dozens of companies streamline their operations using smart automation. He believes AI agents aren't just tools—they're workers that take on repeatable tasks so your human team can focus on what matters. If you want to reduce time waste and increase output, AI agents are the next move.
Book industry standards are evolving rapidly. In the first part of this session, we’ll share an overview of key developments from 2024 and the early months of 2025. Then, BookNet’s resident standards expert, Tom Richardson, and CEO, Lauren Stewart, have a forward-looking conversation about what’s next.
Link to recording, presentation slides, and accompanying resource: https://bnctechforum.ca/sessions/standardsgoals-for-2025-standards-certification-roundup/
Presented by BookNet Canada on May 6, 2025 with support from the Department of Canadian Heritage.
Artificial Intelligence is providing benefits in many areas of work within the heritage sector, from image analysis, to ideas generation, and new research tools. However, it is more critical than ever for people, with analogue intelligence, to ensure the integrity and ethical use of AI. Including real people can improve the use of AI by identifying potential biases, cross-checking results, refining workflows, and providing contextual relevance to AI-driven results.
News about the impact of AI often paints a rosy picture. In practice, there are many potential pitfalls. This presentation discusses these issues and looks at the role of analogue intelligence and analogue interfaces in providing the best results to our audiences. How do we deal with factually incorrect results? How do we get content generated that better reflects the diversity of our communities? What roles are there for physical, in-person experiences in the digital world?
2. What is SSH?
Secure Shell aka SSH is a secure encrypted communication protocol
designed to replace older insecure protocols like telnet, rsh, and ftp.
3. What is SSH?
Secure Shell aka SSH is a secure encrypted communication protocol
designed to replace older insecure protocols like telnet, rsh, and ftp.
SSH authentication can be done with a username and password
combination which is the default. Here's the most simplistic usage we might
encounter.
$ ssh user@secureserver
After you connect to secureserver you are normally asked for your
password to complete the login.
4. What is SSH?
Secure Shell aka SSH is a secure encrypted communication protocol
designed to replace older insecure protocols like telnet, rsh, and ftp.
SSH authentication can be done with a username and password
combination which is the default. Here's the most simplistic usage we might
encounter.
$ ssh user@secureserver
After you connect to secureserver you are normally asked for your
password to complete the login.
When you start doing this over and over again for many systems with
various paswords it can become pretty tedious. What if there was a way to
simplify the process?
Time for SSH Keys to save the day!
5. Enter SSH Keys!
SSH can be configured to use key pairs so that you don't have to type your
password in every time you need to log into a commonly accessed
system. Your public key is placed on all systems you wish to access using
your private key.
6. Enter SSH Keys!
SSH can be configured to use key pairs so that you don't have to type your
password in every time you need to log into a commonly accessed
system. Your public key is placed on all systems you wish to access using
your private key.
There's a lot of technical details surrounding public-key cryptography but for
our purposes all you really need to know is that it's a really secure way of
proving who you are to a third party system.
Let's begin with creating your key pair if you don't already have one. Mac
and Linux setup is basically identical. For Windows you will need Putty and
PuTTYgen installed.
7. Key Creation for Windows
For Windows users I'm cheating and sending you to an excellent
PuTTYgen how-to which includes key pair creation.
http://theillustratednetwork.mvps.org/Ssh/Private-publicKey.html
8. Key Creation for Mac/Linux
On unix like systems (Ubuntu, OSX, etc.) we'll need to go through a few
steps. Fortunately it's likely you already have an SSH directory because if
you have ever used SSH one was created for you.
Open up a terminal window and check your home directory for a hidden .
ssh directory.
$ cd ~/.ssh
9. Key Creation for Mac/Linux
On unix like systems (Ubuntu, OSX, etc.) we'll need to go through a few
steps. Fortunately it's likely you already have an SSH directory because if
you have ever used SSH one was created for you.
Open up a terminal window and check your home directory for a hidden .
ssh directory.
$ cd ~/.ssh
If you receive a "no such file or directory" type of error message you have
not used SSH and certainly don't have a key installed on your system.
Next we'll create a set of keys which will create the file structure we need
for us automatically.
10. Key Creation for Mac/Linux
When you create an SSH key pair you want to enter a strong passphrase
when prompted to do so*. While you could skip the passphrase it would
allow anyone who can access it the ability to use it. Your key is valuable
and it should be protected at all costs.
11. Key Creation for Mac/Linux
When you create an SSH key pair you want to enter a strong passphrase
when prompted to do so*. While you could skip the passphrase it would
allow anyone who can access it the ability to use it. Your key is valuable
and it should be protected at all costs.
Let's create a strong 2048 bit RSA key with your email address included.
$ ssh-keygen -t rsa -b 2048 -C"[email protected]"
You will be asked for a few options and you can leave those as their
defaults but when asked for a passphrase choose a solid one.
* A common practice when using SSH keys is to omit a passphrase
because the default setup requires that you enter your passphrase each
time you use your key which is seemingly the same as typing a password at
login each time. Further in we'll cover how to work around this so you only
need to enter your passphrase once per session.
12. Key Creation for Mac/Linux
Once your key is created you should see some new files which
were indicated during your key generation.
$ cd ~/.ssh
$ ls
~/.ssh/id_rsa
This is your private key file that ssh will read by default when a login
attempt is made. You can have multiple keys, i.e. id_otherkey.
~/.ssh/id_rsa.pub
This is your public key file for authentication. The contents of this file should
be added to ~/.ssh/authorized_keys on all machines where you wish
to login using key authentication. There is no need to keep the contents of
this file secret.
13. Key Creation for Mac/Linux
To use your shiny new key on a server you need to copy your public key
over the the authorized_keys file. It's usually not safe to try to do a simple
copy/paste since even a stray return will break a key file and OSX doesn't
contain the ssh-copy-id utility so we'll have to do some magic.
$ ssh [email protected] -p 7022 "umask 077;
cat >> .ssh/authorized_keys" < ~/.ssh/id_rsa.pub
14. Key Creation for Mac/Linux
To use your shiny new key on a server you need to copy your public key
over the the authorized_keys file. It's usually not safe to try to do a simple
copy/paste since even a stray return will break a key file and OSX doesn't
contain the ssh-copy-id utility so we'll have to do some magic.
$ ssh [email protected] -p 7022 "umask 077;
cat >> .ssh/authorized_keys" < ~/.ssh/id_rsa.pub
Now you should be able to authenticate to the server with your key.
$ ssh [email protected] -p 7022
If all is right in the world you will be asked for your key passphrase and not
your server password.
15. Key Creation for Mac/Linux
To use your shiny new key on a server you need to copy your public key
over the the authorized_keys file. It's usually not safe to try to do a simple
copy/paste since even a stray return will break a key file and OSX doesn't
contain the ssh-copy-id utility so we'll have to do some magic.
$ ssh [email protected] -p 7022 "umask 077;
cat >> .ssh/authorized_keys" < ~/.ssh/id_rsa.pub
Now you should be able to authenticate to the server with your key.
$ ssh [email protected] -p 7022
If all is right in the world you will be asked for your key passphrase and not
your server password.
Success! :)
16. Key Creation for Mac/Linux
To use your shiny new key on a server you need to copy your public key
over the the authorized_keys file. It's usually not safe to try to do a simple
copy/paste since even a stray return will break a key file and OSX doesn't
contain the ssh-copy-id utility so we'll have to do some magic.
$ ssh [email protected] -p 7022 "umask 077;
cat >> .ssh/authorized_keys" < ~/.ssh/id_rsa.pub
Now you should be able to authenticate to the server with your key.
$ ssh [email protected] -p 7022
If all is right in the world you will be asked for your key passphrase and not
your server password.
Success! :)
Failure :( contact Chris.
17. SSH Agent
Entering your passphrase on every login defeats the intent of using keys.
ssh-agent will take care of the pesky prompts. Under OSX it runs by default
so you will even get a popup asking you to save your passphrase to the
keychain. Once you save it you will never be asked again on your local
system.
18. SSH Agent
Entering your passphrase on every login defeats the intent of using keys.
ssh-agent will take care of the pesky prompts. Under OSX it runs by default
so you will even get a popup asking you to save your passphrase to the
keychain. Once you save it you will never be asked again on your local
system.
For Linux it's little more complex. You will need to add a script to your ~/.
profile file or you can execute a couple of short commands. The following
will start up the ssh-agent and then allow ssh-add to pickup on the variables
and it will hold your key for an entire session. Please note the back ticks
around ssh-agent.
$ eval `ssh-agent`
$ ssh-add
You will be prompted for your passphrase one time but not again
during the same session.
19. SSH Config
We've got new keys and we can access some servers with them. We're still
doing a lot of typing though. e.g.
$ ssh [email protected] -p 7022
Wouldn't it be nice if we could convert that into a short simple easy to
remember command like the following?
$ ssh staging
20. SSH Config
We've got new keys and we can access some servers with them. We're still
doing a lot of typing though. e.g.
$ ssh [email protected] -p 7022
Wouldn't it be nice if we could convert that into a short simple easy to
remember command like the following?
$ ssh staging
We can! Using a user configurable ssh config file you can create aliases for
commonly access systems. Just create a config file using your favorite
editor and adding it to your .ssh directory.
$ nano -w ~/.ssh/config
Host staging
User <your-username>
Hostname 174.143.170.119
Port 7022
21. SSH Config
There are a number of things you can do inside the ssh config file but
aliases/bookmarks are probably the most common entries you will run into
or need for yourself. Here's the basic entry for our staging example.
Host staging
User <your-username>
Hostname 174.143.170.119
Port 7022
This creates an alias to the 174.143.170.119 server with our user and port
options. The "Host" line is the alias name we assign. Now calling the
following will start an ssh session for ssh [email protected] -p 7022.
$ ssh staging
22. The End
That's it. You are now an ssh wizard and can work both conveniently and
securely. Keep your keys safe but if they are ever lost or you suspect an
issue notify an admin quickly.
To be really useful you will want to add your current private key or create a
new key for staging. Because of permission issues however you may need
a hand setting things up correctly.