Create an EC2 that runs Chrome for sandboxed websurfing

Ever want to visit a website but don’t trust it enough to use your personal/work computer? What you need is a temporary system that is totally isolated from anything sensitive. Why not use a cloud-based virtual machine, such as offered by Amazon Web Services Elastic Compute Cloud? Here is how… Continue reading

Linux Hardening

From a compliance perspective, organizations need to have a hardening standard derived from an authoritative source with solid engineering-based reasons of why we depart from any of the recommendations.  Most organizations use the Center for Internet Security (CIS) Hardening Benchmarks because that choice is easy to defend.  The CIS benchmarks… Continue reading

Bash Script Tests for OS and Run as Root

In my last post, I discussed using sed, the stream editor to make configuration file changes via a bash script.  There are two important factors to keep in mind: Many configuration file can only be modified as root, and The location of configuration files will vary depending on the Linux… Continue reading

How to Install TSHARK in Unattended Mode via Script

After extensive searching the InterWebs and finding a lack of documentation on how to install TShark in a silent/unattended mode, I came across a related StackExchange post by Franck Dernoncourt that got me on the right track.  Here is what I came up with for Debian: DEBIAN_FRONTEND=noninteractive apt-get -y install tshark Background… Continue reading

Change config settings using a bash script

There is a trend to perform all system administration tasks using scripts. The benefit of this approach is that the scripts can be checked into a source control system, such as github. One great application of this strategy is the script that you use to harden your Linux systems.  This… Continue reading

Securely Delete Files with SDelete

Yesterday, I needed to securely delete a file from a computer that I was using at work and this computer did not have a utility to do that currently installed.  Remember that when you delete a file in Windows, you are removing only the reference to the file from the… Continue reading