The goal is to setup your Raspberry Pi as a tor socks Proxy and help you setup a desktop web browser to use the tor socks proxy. This shall allow you to browse anonymously without having to install tor on your desktop machine. You may use other applications with this tor socks proxy installed on… Continue reading Setting up Tor socks Proxy on Raspberry Pi
Why backup is critical In 21st century all organization are having a technology infrastructure, some hosting locally some in the cloud. A school/educational institution is no different. In a school we store all our data electronically. We have electronic student records, results, student works, curriculum data, administrative data, emails, various configurations, systems data and much… Continue reading Backup systems and Data security for schools and educational institutions
Content filtering for enterprise network or educational institution can be a mandatory requirement in many institutions/organizations. Besides filtering web content by category, content control/filtering software can also helps us to filter out malware and virus sites, unwanted advertisements etc. Finding the right product and making it work for your organization can be a challenge.… Continue reading Content control software/ Web Content filtering using SquidGuard for enterprise network
SquidGuard is a content filtering tool used in enterprise network to control/filter sites that end users/hosts can access. SquidGuard is built to work as a plug-in for squid. It uses black lists and url redirection technology to make this content filter work. There are many free/paid black lists available in the internet, that SquidGuard can… Continue reading SquidGuard implementation for enterprise network
Reading a blog on Acxiom Corporation making billion dollar of sales having over 1,500 data points on half a billion people makes me think what future does a privacy free internet hold for us. On one side we want to see internet to be freed from government regulation, on the other hand we as a… Continue reading They sell your privacy! We don’t know who they are!
Managing and securing password has been one of the biggest challenges. Password leaks news on such a short span of time on linkedin, eHarmony, last.fm makes me think that, these events are gradually getting more widespread. According to Wikipedia: A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example:… Continue reading How Safe is your password?
Do-Not-track After learning all about Collusion plug-in for firefox, few months back, looking at the images of network of tracker, it was always in the back of my mind while browsing how online advertising companies always trying to predict “what I am looking for” by putting on all these sponsored adds, which most of the… Continue reading Do not track IE, firefox, chrome? Who is on your side?
Being a Network administrators, systems administrators we always like to have some tools handy to look into, troubleshoot or just to figure things out. There are many open source, free tools available specialized for different purposes In this blog I shall attempt to list some of them, give a brief description and list the available… Continue reading Essential tcp ip network tools, network Swiss army knife
At times we need to clean up our disks for whatever reason, like installation errors, privacy, security or to clean up an infected file you need a special deleting procedure. Tools like regular delete only remove the inode of the file, which does not touch the data/contents. It is possible to recover these deleted files… Continue reading How to securely and effectively erase a disk with DD
What is a Zero day exploit? A zero-day (or zero-hour or day zero) attack or threat is a computer threat that tries to exploit application vulnerabilities that are unknown to others or the software developer A life cycle of the Zero-day exploit The developer creates software containing an unknown vulnerability The attacker finds the vulnerability before the developer does The attacker writes and distributes an exploit while the vulnerability is… Continue reading Economics of the Zero day exploit