We all want to know to which internet connections our devices connect to. One of the best ways to do that, is use iftop. Install the iftop package in OpenWRT on the router itself to enable it to be used to monitor these network connections. To do so, open a terminal window on your computer … Continue reading How to watch the internet connections established by devices on OpenWRT router real-time with iftop
If you need to send a file to someone over the Internet, you can try several services such as Dropbox, OneDrive, Google Drive and more. But, what if you want to accomplish the same without logging in or registering on a website and also without giving away a lot of private information? To do this, … Continue reading Send files to others using sendspace.com as temporary file storage space
Wireless adapter on Lenovo Z580 does not connect to Internet in Linux although it detects all the wireless networks. Finally, got the settings right to enable the use of built-in Broadcom 4313 Network controller : Broadcom Corporation BCM4313 802.11bgn Wireless Network Adapter [14e4:4727] (rev 01) Here are the steps. Open a terminal window. In the … Continue reading Broadcom 4313 wireless does not connect to network or internet in Linux but detects wireless networks
To determine all services connecting to the internet, enter the command below in a terminal window: $ sudo lsof -n -P -i +c 15 <enter> You can also find similar information using the command below: $ sudo netstat -anp | grep e tcp e udp <enter>
To test if your computer firewall is protecting you on the internet, see this post. Ubuntu installs a firewall when you install it to your computer. However, the firewall is not active. To activate the firewall, open a terminal window on your system, then enter the commands in italics as shown below: $ sudo ufw … Continue reading Firewall in Ubuntu Linux
Recently, linkedin.com (http://www.linkedin.com) has introduced a slew of new features. Most features are introduced to enhance your experience with using the site, but there are others that appear very useful, but have some concerns over the information you have that you can control on the linkedin.com site. When you create profiles on social networking sites … Continue reading Linkedin.com and your personal information
Use scp to copy files securely from one linux computer to another over a network. $ scp -r /folder/folder1 firstname.lastname@example.org:/home/user/folder <enter> where: /folder/folder1 is the source folder -r is for recursively copy email@example.com: is the destination computer. This can also be an IP address /home/user/folder is the destination folder. Once you type above command, you … Continue reading Securely copy files to Linux across a network
Like erstwhile forts, security relies upon defense in depth and also upon the security of other infrastructure elements, that a particular service depends on. If the crocodiles in the moat around the fort die, then you have a vulnerability that can compromise the security of the fort. Therefore, this item http://news.cnet.com/8301-1009_3-20044775-83.html?tag=nl.e757 illustrates a key element, … Continue reading RSA Secure ID vulnerability
You can use http://nmap-online.com It is the equivalent of scanning a system or network for open ports from outside of the network you are in.
You can identify the vulnerabilities open for your web browser by visiting http://www.browserscope.org. This gives you an opportunity to look for a patch for any vulnerabilities eliminated by your browser software developer.