In my last post, I discussed using sed, the stream editor to make configuration file changes via a bash script. There are two important factors to keep in mind: Many configuration file can only be modified as root, and The location of configuration files will vary depending on the Linux… Continue reading
Search this site
Check out my other project…
- Create an EC2 that runs Chrome for sandboxed websurfing
- Check Multiple AWS S3 Buckets for Missing Default Encryption
- The Equifax Data Breach and the Apache Struts Vulnerability
- Test Early, Test Often
- Linux Hardening
- Information Security at Startup Companies
- Timestamp bash_history with every command
- Has SHA-1 been hacked?
TweetsLoad More...Jane Slater@SlaterNFL
An Ex Boyfriend once got me a Fitbit for Christmas. I loved it. We synched up, motivated each other... didn’t hate it until he was unaccounted for at 4am and his physical activity levels were spiking on the app 🥴wish the story wasn’t real. https://twitter.com/albertbreer/status/1202326675012362240
Hello world! fwd:cloudsec is a new cloud security conference taking place in Houston on June 29, 2020. We're interested in all clouds, attack and defense, and more. We want to talk about the stuff that the vendor conferences don't.
Read more at https://fwdcloudsec.org/
I will be ery interesting to look into the forensic implications of this new capability: https://aws.amazon.com/blogs/aws/new-programmatic-access-to-ebs-snapshot-content/