Permit access to the web server only through CloudFlare (iptables)

Permit access to the web server only through CloudFlare (iptables)  
Cloudflare is a great thing for protecting websites from different computer rogues - the Hackers. However, if they still found out somehow the original IP of the web server on which the site is located, they will at least try to attack it by IP, bypassing the proxy. It is possible to fence redirects, send NGINX-res codes 444 when trying to go to non-existent domains, but the most ironic way out of the situation is this: open http /https traffic to the server only for the IP addresses of our security proxy.
 
useless. crimeflare.org . Well, I found out the "detective" ...
+ 0 -

White spots in work with SSH

SSH is a very powerful and flexible tool, but as practice shows, not everyone understands how it works and uses it correctly. The word Secure is part of the abbreviation of SSH and is one of the key aspects of the protocol, but, often, safety is not given enough attention. In this article, I want to talk about a few common mistakes when working with SSH, as well as about moments that are often overlooked.
 
 
White spots in work with SSH
 
 
Security with SSH keys
 
...
+ 0 -

The IPhone will automatically transmit the coordinates when calling in 911

The IPhone will automatically transmit the coordinates when calling in 911When calling the rescue service, part of the talk time is to determine the place where doctors, firemen or police need to go. Automatic sending of geolocation data will reduce the talk time. In the US, an emergency call is made by 25 million people a year, and the acceleration of the response of rescuers by one minute is can result in to the salvation of more than ten thousand lives during this period. In the coming autumn this year iOS 12 will appear. function ...
+ 0 -

"Where did not expect": Yahoo fined at £ 250k for violating the old rules for working with PD

The other day, the Office of the British Commissioner for Information fined Yahoo for failing to comply with the Data Protection Act of 1998. The reason was the leakage of personal data of 500 thousand citizens of Great Britain, which occurred in 2014. We tell about this situation.
 
 
"Where did not expect": Yahoo fined at £ 250k for violating the old rules for working with PD

 
/Flickr / Stock Catalog / CC BY
 
 

How come


 
In 201? cybercriminals cracked Yahoo's servers and stole the credentials of half a million users, including phone numbers, birthdates, passwords, questions for account recovery and answers to them. Theft was ...[/h]
+ 0 -

Hacking of "smart" counters on PHDays 8: analysis of MeterH3cker contest

Hacking of "smart" counters on PHDays 8: analysis of MeterH3cker contest
 
 
This year, the competitive program Positive Hack Days was replenished with a competition to crack smart grid elements - " MeterH3cker ". At the disposal of the participants was a mock-up of two houses, according to the organizers' idea, solar panels provided the houses with electricity, and the resulting surplus of energy could be sold to a common electric grid at a special tariff. The task of the attackers was to disrupt the normal process of electricity metering by any possible means and to affect the monetary balance in the billing system. ...
+ 0 -

Security Week 22: two-second smart locks

Security Week 22: two-second smart locks The past week was marked by a couple of interesting news from the insecure world of Internet things, and the main event, of course, was the study of the smart lock Tapplock ( , News , Original report ). Researcher from Pen Test Partners Andrew Tierney did not just bypass the protection of the electronic lock, but rather discovered the complete absence of any security system in the "digital" part of the device.
 
Indiegogo , planning to collect 40 thousand dollars for bringing finished prototypes to ...
+ 0 -

Installing the certificate on the HTTP server Apache

Installing the certificate on the HTTP server Apache
 
This article offers step-by-step instructions for installing a certificate on an Apache HTTP server. Note that since Apache version 2.4.? the server configuration parameters have been changed.
 
account GlobalSign by pressing the
button.  
" Edit "To the left of the order number and having copied the certificate in PEM format. .
 
 
The private key for the certificate is created along with the certificate request (CSR), so the private key file can already be on your server. If the private key is lost, then the certificate must be reissued.
 
 
The intermediate certificate that you need ...
+ 0 -

"Those who are ready to exchange freedom for security are not worthy of either freedom or security" (original source)

"Those who are ready to exchange freedom for security are not worthy of either freedom or security" (original source)For the first time I heard this phrase when I was a violent revolutionary student from Major-General Petrov at the video lecture on DOTU (Sufficiently General Management Theory), since then I often use it as the "last argument of the king" in discussions of the affairs of the world. But since the world entered the active phase of post-truth and fake with metastases, I decided to dig up the original sources and understand the context in which this phrase was used by old Ben, and what he wanted to say /to prove to the reader.
 
 
I offer ...
+ 0 -

Release of the unofficial MTProto proxy in Python, features protocol

Release of the unofficial MTProto proxy in Python, features protocol

 
Recently, Telegram developers have laid out the source of a proxy server that uses the MTProto protocol. On the hub came out articles about features of its assembly and repackaging the container docker with it . The official proxy server, written in C, surprises with the amount of code - about 23 thousand lines. At the same time, and sometimes a little earlier, several alternative implementations came out, but none of them supported the possibility of advertising their channel.
 
 
In this article I would like to tell you about the little-known peculiarities of the proxy server communication ...
+ 0 -

Analysis of various methods of IT training

Many people are interested in the question of how best to train and why? Let's consider all the training options and choose the optimal one for this or that task
 
 
So, the main types of training in the IT field are the following:
 
 
 
Forums, conferences, free resources
 
Books
 
Remote self-study on the Internet
 
Webinars
 
Full-time education
 
 
Perhaps there are some other forms, but they are mostly similar to those that are already indicated. Let's now examine each form of training separately and identify the strengths and weaknesses.
 
 
[h3] Forums, conferences and free resources ...[/h]
+ 0 -