Archive | Security RSS feed for this section

pfSense – configuring Windows Active directory authentication

March 3, 2014

0 Comments

pfsense-icon-geeklk

pfSense, one of the most powerful open-source firewall router (software based) which is completely based on FreeBSD OS family. Now you may assume, that you will need to know about terminal commands to control and manage this. Well, part of it is true as you will need to know about commands for any advancing purpose […]

Continue reading...

Find Your Android using Android device manager

October 25, 2013

0 Comments

Lost your Android device? Couldn’t find it? Do not worry Google will locate your device for you. This was initially introduced by Apple by there Find My iPhone, Although it is a late catch up Google it works really well. You can remotely ring your Android device and you can also wipe all the date in your […]

Continue reading...

Installing OpenVPN with Shorewall in Ubuntu – Part 2

September 16, 2013

0 Comments

OpenVPN

If you haven’t go through the OpenVPN installation part, you can check in Part 1. Now we have a client connected to the server with IP address 10.8.0.17. First we need to tell server to route incoming packets destined to internet through server’s public IP. Which we call NAT. I’m using Shorewall to do the […]

Continue reading...

Installing OpenVPN Server with Shorewall in Ubuntu – Part 1

August 16, 2013

0 Comments

OpenVPN

Hello everyone. I couldn’t post anything recently as I got stuck with some projects. Today I’ll be covering OpenVPN installation with Shorewall in Ubuntu 12.04. This is something new I tried and it worked for me :D. On the first part I’ll go through the basic installation and getting a user connected to the server. […]

Continue reading...

IPFire the Successor to IPCop

May 30, 2013

0 Comments

IPFire

Being a fan of IPCop when I was trying to download it and just for my curiosity typed IPCop vs in Google search and found something interesting, an another firewall distro called IPFire. After doing some reading I found that it’s the completed version of current IPCop which includes all the features that are inbuilt into […]

Continue reading...

Keep SSH Session Alive After Disconnecting

July 1, 2012

0 Comments

ssh-logo-geeklk

When I use SSH to remotely manage my Ubuntu servers specifically when installing applications and editing config files sometimes I get disconnected due to internet connectivity issues. Most of the time I use Hamachi VPN to connect to the servers. If it get disconnected in middle of setting up something, there is no way to […]

Continue reading...

DRBL (Diskless Remote Boot in Linux)

June 26, 2012

0 Comments

drbl-logo-geeklk

Diskless Remote Boot in Linux (DRBL) is a small piece of software using which you will be able to use your old hardware to remote boot into a central Linux server and perform several tasks with ease.

Continue reading...

Forgot to sign out of my Gmail account

May 19, 2012

0 Comments

Gmail logo

Discuss more about posts, topics & issues at our GeekLK Help It happened to me once. I walked out from one of my clients site and then I just realized that I forgot to sign out from my Google drive. All Google services works with single sign in :). So I could sign out all currently logged in […]

Continue reading...

Use the Internet wisely & Stay safe from DNS Changer malware

May 11, 2012

3 Comments

malware

Hello Folks, Once again, I’m back with another piece of information which is useful for the users. Almost all the internet audience will be targeted on this since it’s a privacy & protecting your self over the internet. Okay!! Today’s topic is about the famous malware which is spreading over the net anonymously these days & injecting users computer […]

Continue reading...

Network Layers (OSI Model) :: Explained [Part 2]

April 1, 2012

0 Comments

network-logo-geeklk

Have you missed the 1st part.. Read -> PART 1 Assuming you’ve read Part 01, I’m continuing to explain by expanding this article.. Alright!! I hope you’ve got to learn something about OSI model as we now going to learn about the networking layers which defines this model. As I’ve explained, there are seven layers […]

Continue reading...