How to watch the internet connections established by devices on OpenWRT router real-time with iftop

We all want to know to which internet connections our devices connect to. One of the best ways to do that, is use iftop. Install the iftop package in OpenWRT on the router itself to enable it to be used to monitor these network connections. To do so, open a terminal window on your computer … Continue reading How to watch the internet connections established by devices on OpenWRT router real-time with iftop

Send files to others using sendspace.com as temporary file storage space

If you need to send a file to someone over the Internet, you can try several services such as Dropbox, OneDrive, Google Drive and more. But, what if you want to accomplish the same without logging in or registering on a website and also without giving away a lot of private information? To do this, … Continue reading Send files to others using sendspace.com as temporary file storage space

Broadcom 4313 wireless does not connect to network or internet in Linux but detects wireless networks

Wireless adapter on Lenovo Z580 does not connect to Internet in Linux although it detects all the wireless networks. Finally, got the settings right to enable the use of built-in Broadcom 4313 Network controller [0280]: Broadcom Corporation BCM4313 802.11bgn Wireless Network Adapter [14e4:4727] (rev 01) Here are the steps. Open a terminal window. In the … Continue reading Broadcom 4313 wireless does not connect to network or internet in Linux but detects wireless networks

Firewall in Ubuntu Linux

To test if your computer firewall is protecting you on the internet, see this post. Ubuntu installs a firewall when you install it to your computer. However, the firewall is not active. To activate the firewall, open a terminal window on your system, then enter the commands in italics as shown below: $ sudo ufw … Continue reading Firewall in Ubuntu Linux

Linkedin.com and your personal information

Recently, linkedin.com (http://www.linkedin.com) has introduced a slew of new features. Most features are introduced to enhance your experience with using the site, but there are others that appear very useful, but have some concerns over the information you have that you can control on the linkedin.com site. When you create profiles on social networking sites … Continue reading Linkedin.com and your personal information

Securely copy files to Linux across a network

Use scp to copy files securely from one linux computer to another over a network. $ scp -r /folder/folder1 user@computer.com:/home/user/folder <enter> where: /folder/folder1 is the source folder -r is for recursively copy user@computer.com: is the destination computer. This can also be an IP address /home/user/folder is the destination folder. Once you type above command, you … Continue reading Securely copy files to Linux across a network

RSA Secure ID vulnerability

Like erstwhile forts, security relies upon defense in depth and also upon the security of other infrastructure elements, that a particular service depends on. If the crocodiles in the moat around the fort die, then you have a vulnerability that can compromise the security of the fort. Therefore, this item http://news.cnet.com/8301-1009_3-20044775-83.html?tag=nl.e757 illustrates a key element, … Continue reading RSA Secure ID vulnerability