Denyhosts Assists
- Apr
- 10
- Posted by TKH Specialist
- Posted in Security, System Administration
Every so often a legitimate user will get blocked by deny hosts. When this happens you can re-enable their access with these 8 simple steps (UPDATE: or use the faster version, see below): Stop DenyHosts # service denyhosts stop Remove the IP address from /etc/hosts.deny Edit /var/lib/denyhosts/hosts and remove the lines containing the IP address. […]
read moreGoogle Play Misses Dangerous Apps at Border Control
- Jul
- 23
- Posted by John P. Mello Jr.
- Posted in Security
Despite yeoman efforts by Google to close a critical hole in its Android mobile operating system that allows any app to be turned into a malicious Trojan, programs are still appearing in the company’s Google Play store with the flaw. A number of apps containing the so-called MasterKey vulnerability were discovered by cybersecurity firm Bitdefender last week.![]()
Crontab Sudo Shenanigans
- May
- 16
- Posted by TKH Specialist
- Posted in redhat, Security
OK, here is a situation I haven’t seen in a while and it tripped me. There I admitted it! We have an application that requires a restart of Apache everyday (that is a different discussion). Regardless I gave them sudo access so they could script the job to run with their process. Obviously I thought […]
read moreAndroid: A Second Career in Security?
- Apr
- 23
Many of us have a wealth of decommissioned corporate-provisioned mobile devices: We’ve bought them, handed them out, and seen them used successfully for years. Now they’re on their way to the great docking station in the sky. However, because these devices are already off the books adapting them for specific security functions can mean achieving certain goals practically for free.![]()
Putting ‘lsof’ to use
- Apr
- 19
- Posted by TKH Specialist
- Posted in redhat, Security, System Administration
- 3
lsof is a powerful tool that has proven very userful over the years in troubleshooting and forensic investigations. Here are some useful lsof command examples: In this example we are looking at all the files a given process has open (pid=1655 here this is the zabbix agent) lsof -p 1767 Note you can clean up […]
read moreNBC site redirecting to Exploit kit
- Feb
- 24
- Posted by TKH Specialist
- Posted in Security, Tech News
We became aware that the NBC[.]com website is redirecting to malicious websites that contains exploit kit. At this point it seems like most of the pages contains an iframe that is redirecting to the first stage of the RedKit exploit kit. Some twitter users are already poiting out some of these bad pages. Some of […]
read moreRecent Comments
- Stefan on Flush This!
- Timestamping your Bash History | Matt's Entropy on Remember when you issued that command…?
- Matt Smith on Remember when you issued that command…?
- Ruan on Putting ‘lsof’ to use
- Dylan F. Marquis on External Mapping of LDAP attributes in CAS

