personal Blog and Website

Latest posts

A Guide to Java Sockets

1. Overview The term socket programming refers to writing programs that execute across multiple computers in which the devices are all connected to each other using a network. There are two communication protocols that one can use for socket programm...

How to Set Up SSH Keys on Linux

Secure Shell (SSH) is a cryptographic network protocol used for a secure connection between a client and a server and supports various authentication mechanisms. The two most popular mechanisms are passwords based authentication and public key-based...

Intrusion detection with git – the basics

How can you make sure all your system binaries and configuration files have not been compromised by an intruder? You can of course run rkhunter[1] or AIDE[2] on a regular base or via cron, but this is only going to show you, that a MD5 checksum has b...

SSH tunnelling for fun and profit: Autossh

Now that you are able to create various forward or reverse SSH tunnels with lots of options and even simplify your live with ~/.ssh/config you probably also want to know how make a tunnel persistent. By persistent I mean, that it is made sure the tun...