20 most common passwords

I wouldn't want this post to disappear, so just to make sure that the information is better spread on what passwords *not to use*, here is the list: 1. 123456 2. 12345 3. 123456789 4. Password 5. iloveyou 6. princess 7. rockyou 8. 1234567 9. 12345678 10. abc123 11. Nicole 12. Daniel 13. babygirl 14. monkey 15. Jessica 16. Lovely 17. michael 18. Ashley 19. 654321 20. Qwerty Come on, people, get some imagination!

Why adding . to the PATH on UNIX is BAD ?

This article was first written in December 2003 for
the BeezNest technical website (http://glasnost.beeznest.org/articles/96)
Some UNIX administrators find it handy to add «.» in the PATH (and some even put it at the beginning of the PATH). Why is this bad? On UNIX, everything is made so that you don't have to do it. Anything not doing so can be considered buggy, and can be fixed easily. Imagine someone has access to write a file in a otherwise harmless directory, like /tmp for example. Image now that that someone wants to do harm.

Netfilter - iptables on Debian

To create and save iptables rules the default Debian way, this is the way to go:
  • create your rules using the CLI [1] iptables
  • save them on the active rule by issuing a /etc/init.d/iptables save active
  • create the rules for the inactive state (when booting, for example) and save them accordingly
That way, the rules will survive a reboot. To delete a specific rule previously saved as above:
  • go into /var/lib/iptables/active and take the

IDS - Intrusion Detection Systems

An IDS is a system to track any changes not planned to a system. It is often used on sensitive machines where any unauthorized access is purely prohibited but can also act as a fool-proof system, more like a monitoring system. It works by checksumming or understanding the format of each file, and scrutinizing any suspect change to files.