Add Me!Close Menu Navigation

My technical corner about Linux, Perl, programming, computer networks and network security

Add Me!Open Categories Menu
21 June

How to completely hide your network traffic

In this article I explained what may see your Internet Service Provider. Now, I will write some information about how to protect your network traffic.  My solution is based on a bash script on a client and a server. The script works on the client computer, connects to the server […]

13 June
Posted in Bash, Linux, Security

Basics of writing bash scripts, autoblocking ssh break in attempts

This script is a typical problem of the reinvention wheel, because there are many programs, which may prevent from robots which are try to guess the passwords in the ssh service. If you don’t trust your security skills, you should use them or read this text. I will try to […]

10 June
Posted in Perl

Automate your testing with Perl – a simple example

Testing is one of the most important things during programming. Good testing saves your time and health. In Perl, there is the Test::More perl module for it, but many begginers programmers don’t know how to use it, because the standard examples is too simple a here.     The simplest: […]

1 June
Posted in Perl, Projects

SQLib – easy store your SQL queries in a separate file

In big commercial projects a separate some layers from a raw code is important. This is the typical advantages of almost each framework. Effects of this separation are templates, languages files, modules, etc. But not every framework supports separating SQL queries. I didn’t find any good (for me) perl module […]

21 May

Secure configuration of OpenSSH

OpenSSH is a service designed for a remote management hence secure configuration of it’s mandatory. I show some useful tricks to make your OpenSSH safer. I will describe options from the main configuration file of the OpenSSH service – in most distributions it’s located at /etc/ssh/sshd_config 1) Turn off the […]

5 May
Posted in Bash, Linux, Perl

Useful one-liners, part I

Find 1) Find the all files in the working directory (and subdirectories) if these have “*.doc” extension and execute some command. To do this, I use simple a regular expression and the echo command: find . -type f -iname “*.[dD][oO][cC]” -exec echo {} \;   2) Delete all files and directories […]

2 May
Posted in Bash, Linux, Projects, Security

Remote technical support by VNC through SSH Tunnel

I suppose that you are an advanced linux user. And those skills make you really happy. But, sometimes we have a big problem: our friends may want to have Linux on their computers. There are many reasons why. Probably Linux looks like pretty for those people. The main point is: […]

22 April
Posted in Security

The cryptography and Truecrypt basics

In this post i will try to simply explain the amazing cryptographic world to people whose don’t understand it. If you are interesting the cryptography and the informations protection in computers technology but you aren’t able to understand many terms, this article is for you!   Cryptography for ordinary people The […]

20 April

What can see your Internet Service Provider?

Did you think ever what’s happening when you are browsing the Internet? Network flow of information in a typical computer network is displayed on the image below: Let me introduce you about couple things. The field “Your computer” represents a computer, smartfon, notebook, printer, a TV tuner – each network […]

15 April
Posted in Bash, Linux

Basics of writing bash scripts – advanced backup

More inteligent and advanced backup Sometimes something may go wrong and then a simple script may not help us. There is nothing worse than an admin realising that his own script has crashed his professional career because it didn’t work correctly (corrupted spare files, low disc space, etc). Usually the […]