This tutorial explains GDM (GNOME Display Manager) modification to support user verification through keystroke-dynamics processing. Modified GDM allows only you to login. If you go ahead and tell your password to a friend. They still won’t be able to log in using GDM without knowing the precise method of typing required when entering your user […]
So how do you restrict or deny access by IP address using Lighttpd web server? Lighttpd has mod_access module. The access module is used to deny access to files with given trailing path names. You need to combine this with remoteip conditional configuration. Syntax is as follows: $HTTP[“remoteip”] == “IP” : Match on the remote […]
The replace command is a string-replacement utility. It changes strings in place in files or on the standard input. This command uses a finite state machine to match longer strings first. It can be used to swap strings. This command is similar to the Perl -pie syntax or sed (stream editor) command.
A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target’s system. This is a well known type of attack and is generally not effective against modern networks. It works if a server allocates resources after receiving a SYN, but before it has received […]