15 steps to secure your iPhone / iPad
There has been a lot of controversy in the media regarding the security of Apple iPhone and iPad devices. Whilst both ship with a natively secure operating system, the majority...
There has been a lot of controversy in the media regarding the security of Apple iPhone and iPad devices. Whilst both ship with a natively secure operating system, the majority...
When you download a CentOS DVD ISO file (for example: http://iso.linuxquestions.org/download/1274/2996/ftp/mirror.its.uidaho.edu/CentOS-5.5-i386-bin-DVD.iso), it can be helpful to check the files checksum against the download list to confirm the integrity of the...
In the event your Linux box experiences disk or file system issues you may receive a “Give root password for maintenance” prompt upon reboot. If you have your root password...
As Internet accessible corporate Voice over IP servers continue to grow in number, so does the risk of rogue individuals gaining access to SIP extensions due to weak or poorly...
The installation process for Fail2Ban (a brute force protection application) on CentOS 5.5. is as follows – Login to your server as root, then: wget http://downloads.sourceforge.net/project/fail2ban/fail2ban-stable/fail2ban-0.8.4/fail2ban-0.8.4.tar.bz2?use_mirror=transact tar -xf fail2ban-0.8.4.tar.bz2 cd...