ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Secure CentOS 7 Server

    IT Discussion
    9
    43
    7.9k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Deleted74295D
      Deleted74295 Banned @scottalanmiller
      last edited by

      @scottalanmiller said:

      If hack does not involve social engineering. Paper records are the easiest for the FBI to get if they are on US soil.

      In a safe, in a field, with no paper trail.

      If things are so easy to find, where is Jimmy Hoffa? ๐Ÿ™‚

      scottalanmillerS 2 Replies Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller @Deleted74295
        last edited by

        @Breffni-Potter said:

        The day we stop asking questions for fear of the man, is the day Big Brother has taken complete power.

        So.... a while ago ๐Ÿ™‚

        1 Reply Last reply Reply Quote 2
        • scottalanmillerS
          scottalanmiller @Deleted74295
          last edited by

          @Breffni-Potter said:

          If things are so easy to find, where is Jimmy Hoffa? ๐Ÿ™‚

          When the government wants you to disappear, you disappear. When they want you found, you get found.

          1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @handsofqwerty
            last edited by

            @handsofqwerty said:

            @Aaron-Studer said:

            AJ - I thought by changing your username that you were turning over a new leaf. Guess not.

            I have. I just don't see the whole purpose of the post. If it's for fun, why are you hosting it? Do something like this on your own hardware.

            What's wrong with hosting it? I don't see why the goal would make hosting it elsewhere not make sense?

            handsofqwertyH 1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @Deleted74295
              last edited by

              @Breffni-Potter said:

              In a safe, in a field, with no paper trail.

              If things are so easy to find, where is Jimmy Hoffa? ๐Ÿ™‚

              He's probably in a safe, in a field with no paper trail! I think you answered your own question ๐Ÿ˜‰

              1 Reply Last reply Reply Quote 0
              • ?
                A Former User @dafyre
                last edited by

                @dafyre said:

                @Breffni-Potter I dislike secrecy -- especially in the government... If the government is going to do something, at least be bold enough to tell the public about it... Even if it is after the fact. Otherwise it comes out as a "leak" around election time and detracts from the real issues that the American public is facing.

                This was the idea behind FOIA granted half the time they'll use some excuse not to give you information. Heck having to government jobs on my resume has hindered me getting other jobs. One even flat out said they would not hire someone who's working or has worked for our corrupt government.

                1 Reply Last reply Reply Quote 0
                • ?
                  A Former User
                  last edited by

                  If you don't trust DO with your data then honestly you shouldn't be using them. Any level of security can be bypassed with enough time when you have physical access.

                  1 Reply Last reply Reply Quote 1
                  • scottalanmillerS
                    scottalanmiller
                    last edited by scottalanmiller

                    https://technet.microsoft.com/en-us/library/hh278941.aspx#EBAA

                    Law #1: If a bad guy can persuade you to run his program on your computer, it's not solely your computer anymore.
                    Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore.
                    Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore.
                    Law #4: If you allow a bad guy to run active content in your website, it's not your website any more.
                    Law #5: Weak passwords trump strong security.
                    Law #6: A computer is only as secure as the administrator is trustworthy.
                    Law #7: Encrypted data is only as secure as its decryption key.
                    Law #8: An out-of-date antimalware scanner is only marginally better than no scanner at all.
                    Law #9: Absolute anonymity isn't practically achievable, online or offline.
                    Law #10: Technology is not a panacea.

                    1 Reply Last reply Reply Quote 1
                    • handsofqwertyH
                      handsofqwerty @scottalanmiller
                      last edited by

                      @scottalanmiller said:

                      @handsofqwerty said:

                      @Aaron-Studer said:

                      AJ - I thought by changing your username that you were turning over a new leaf. Guess not.

                      I have. I just don't see the whole purpose of the post. If it's for fun, why are you hosting it? Do something like this on your own hardware.

                      What's wrong with hosting it? I don't see why the goal would make hosting it elsewhere not make sense?

                      Nothing. Just seems like it'd make more sense to try this at home first, but that's just me.

                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                      • scottalanmillerS
                        scottalanmiller @handsofqwerty
                        last edited by

                        @handsofqwerty said:

                        Nothing. Just seems like it'd make more sense to try this at home first, but that's just me.

                        Dont' see why. If the goal is to learn about security, how does learning at home make it more useful than learning in a hosted environment? What about home makes more sense?

                        handsofqwertyH 1 Reply Last reply Reply Quote 0
                        • IRJI
                          IRJ
                          last edited by

                          โ€œPeople who say they donโ€™t care about privacy because they have got nothing to hide have not thought too deeply about these issues. What they are really saying is I do not care about this right. When you say I donโ€™t care about the right to privacy because I have nothing to hide, that is no different than saying I donโ€™t care about freedom of speech because I have nothing to say or freedom of the press because I have nothing to write.โ€

                          -Edward Snowden in an interview today.

                          http://www.theguardian.com/us-news/2015/may/22/edward-snowden-nsa-reform

                          1 Reply Last reply Reply Quote 3
                          • handsofqwertyH
                            handsofqwerty @scottalanmiller
                            last edited by

                            @scottalanmiller said:

                            @handsofqwerty said:

                            Nothing. Just seems like it'd make more sense to try this at home first, but that's just me.

                            Dont' see why. If the goal is to learn about security, how does learning at home make it more useful than learning in a hosted environment? What about home makes more sense?

                            From a technical standpoint, none. I can't really explain why that's how I feel. It's just how it makes sense in my head.

                            1 Reply Last reply Reply Quote 0
                            • 1
                            • 2
                            • 3
                            • 3 / 3
                            • First post
                              Last post