Configure an SSH Connection
When we want to connect securely to a remote machine from within a unix-like system we type in the terminal: ssh root@<server> where <server> is the IP address of our server machine or its domain name. After that we are prompted to enter the password for server root. This is the default procedure for a newly created server in order to connect securely via the SSH protocol through port 22. Let’s optimize this procedure and make it more secure....
Create a new user in a UNIX-like system
Creating a new user is a very important aspect of basic security. Both for home systems and critical-mission servers. For the first case, obviously, we need to be a user other than root, which imposes great risk, and for the second case, it is best for some services to connect via a regular user and not root, which is an easy target. For this article, I’m using a Raspberry PI system but the procedure and the commands are the same for every linux or unix-like system....
The Beauty of Perl
As my first post I decided to write about a language that fascinates me. It’s been quite some time since I finished reading Learning Perl, 2th edition from Randal Schwartz and Tom Christiansen, and I have to say I was amazed by this language. Now, this edition is rather old (1999) because I borrowed it from my local library, now I have the new edition (7th) on my library but the language didn’t change almost at all....