Documentaire (Oct. 2016) dédié à l'acceptation de la surveillance dans la population à travers l'argument "je n'ai rien à cacher" (Mise en ligne CC* Oct. 2017). "Passionnant" (Inrocks), "Qui ouvre les yeux" (Forbes), "Inquiétant" (France 24). Le film est mis gratuitement sur internet mais sa réalisation n'échappe pas aux contraintes financières de la production audio-visuelle. Chacun est donc libre de faire une donation ici: leetchi.com/c/project-nothing-to-hide
Any service that is connected to the internet is a potential target for brute-force attacks or unwarranted access. There are tools like fail2ban or sshguard, but these are functionally limited because they are only parsing log files. Blacklistd takes a different approach. Modified daemons like SSH are able to connect directly to blacklistd to add new firewall rules.
Blogpost qui décrit comment configurer Nextcloud 12 dans une jail FreeBSD 11.
I figured this would be a optimal solution for files that I might need access to unexpectedly, on computers where I am not in complete control. My Nextcloud instance is externally accessible, and yet if someone were to get inside my Jail, I could rest easy knowing they still didn’t have access to the rest of my host server. I chronicled the setup process including jail setup using iocage, https with Lets Encrypt, and full setup of the web stack.
It aims to be faster, simpler, leaner, and more useful than IPSec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. Initially released for the Linux kernel, it plans to be cross-platform and widely deployable. It is currently under heavy development, but already it might be regarded as the most secure, easiest to use, and simplest VPN solution in the industry.
quick reference high level overview for typical penetration testing engagements. Designed as a quick reference cheat sheet providing a high level overview of the typical commands you would run when performing a penetration test. For more in depth information I’d recommend the man file for the tool or a more specific pen testing cheat sheet from the menu on the right.