<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security &#8211; Digital Marketing Through Content &amp; Influence</title>
	<atom:link href="https://notagrouch.com/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://notagrouch.com</link>
	<description>Digital Marketing Blog and other Shennanigans from Oscar Gonzalez.</description>
	<lastBuildDate>Thu, 25 Nov 2021 18:13:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>LastPass Earth Day Sale 25% Off</title>
		<link>https://notagrouch.com/lastpass-earth-day-sale-25-off/</link>
		
		<dc:creator><![CDATA[Oscar Gonzalez]]></dc:creator>
		<pubDate>Wed, 21 Apr 2021 10:24:56 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://notagrouch.com/?p=55127</guid>

					<description><![CDATA[<p>I strongly recommend you use a password manager. My favorite is LastPass. It works across all the browsers I use and all major operating systems. It's inexpensive and easy to use. LastPass keeps your passwords, secure notes, and using the matching browser extension or app on your mobile device, it can autofill passwords when you...</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/lastpass-earth-day-sale-25-off/">LastPass Earth Day Sale 25% Off</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>I strongly recommend you use a password manager. My favorite is LastPass. It works across all the browsers I use and all major operating systems. It's inexpensive and easy to use.</p>



<p>LastPass keeps your passwords, secure notes, and using the matching browser extension or app on your mobile device, it can autofill passwords when you need them. </p>



<p>Lastpass goes one step further and lets you share a username and password with someone else without actually revealing your password. This is particularly useful when you need a staff member, or a consultant to log into one of your accounts but you don't want to actually share the password.</p>



<p>They're currently running a special for Earth day, offering a 25% discount. I would definitely recommend you take a look if you don't already use it. Here's <a class="thirstylink" rel="nofollow" target="_blank" title="Lastpass" href="https://notagrouch.com/goto/lastpass/" data-shortcode="true">the link to check it out</a>.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://notagrouch.com/wp-content/uploads/lastpass-discount.jpg" alt="" class="wp-image-55132"/></figure>
<p>The post <a rel="nofollow" href="https://notagrouch.com/lastpass-earth-day-sale-25-off/">LastPass Earth Day Sale 25% Off</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Get Free SSL Certificate from Inmotion Hosting</title>
		<link>https://notagrouch.com/get-free-ssl-certificate-inmotion-hosting/</link>
					<comments>https://notagrouch.com/get-free-ssl-certificate-inmotion-hosting/#comments</comments>
		
		<dc:creator><![CDATA[Oscar Gonzalez]]></dc:creator>
		<pubDate>Mon, 25 Sep 2017 23:19:25 +0000</pubDate>
				<category><![CDATA[WordPress]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[WordPress Plugins]]></category>
		<guid isPermaLink="false">http://notagrouch.com/?p=50501</guid>

					<description><![CDATA[<p>One of the somewhat recent developments on the web is that Google is starting to prefer content that is secured with an SSL certificate. It started in 2014 with an announcement by Google and it has been getting coverage by most SEO authorities for a while, like here, here and here. Now, 3 years later,...</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/get-free-ssl-certificate-inmotion-hosting/">How to Get Free SSL Certificate from Inmotion Hosting</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>One of the somewhat recent developments on the web is that Google is starting to prefer content that is secured with an SSL certificate. It started in 2014 with an <a href="https://webmasters.googleblog.com/2014/08/https-as-ranking-signal.html" target="_blank" rel="noopener">announcement by Google</a> and it has been getting coverage by most SEO authorities for a while, like <a href="http://searchengineland.com/google-starts-giving-ranking-boost-secure-httpsssl-sites-199446" target="_blank" rel="noopener">here</a>, <a href="https://neilpatel.com/blog/does-a-ssl-certificate-affect-your-seo-a-data-driven-answer/" target="_blank" rel="noopener">here</a> and <a href="https://www.brightedge.com/blog/http-https-and-seo/" target="_blank" rel="noopener">here</a>.</p>
<p>Now, 3 years later, 2017 has been deemed <a href="https://www.sangfroidwebdesign.com/search-engine-optimization-seo/google-https-ranking/" target="_blank" rel="noopener">the year of SSL</a>, and it even seems that maybe it will be <a href="https://blog.sucuri.net/2017/08/google-warning-text-input-forms-october-https-ssl.html" target="_blank" rel="noopener">required for some sites</a>. Heck, Moz shows that at least <a href="https://moz.com/blog/half-page-one-google-results-https" target="_blank" rel="noopener">half of first page results are served via https</a>.</p>
<h2>SSL is no longer for Ecommerce and geeks only</h2>
<p>It used to be that you really only needed SSL if you were collecting or providing sensitive information. Personal, financial or healthcare data. But due to problems with phishing, spoofing, and the growing number of vulnerabilities, it makes sense that all websites should be "verified" through an SSL certificate.</p>
<p>Until the past couple of years, SSL was really only an option that bloggers would consider if they were making money because it was an added cost to hosting, domain registration and any other paid service they needed like Vimeo, or Aweber and similar.</p>
<p><figure style="width: 800px" class="wp-caption alignnone"><img decoding="async" title="https by Sean MacEntee" src="https://notagrouch.com/wp-content/uploads/15944989872_b958dc5552_b_SSL.jpg" alt="SSL photo" width="800" /><figcaption class="wp-caption-text"><small>photo by <a href="http://www.flickr.com/photos/18090920@N07/15944989872" target="_blank" rel="noopener">Sean MacEntee</a> <a title="Attribution License" href="http://creativecommons.org/licenses/by/2.0/" target="_blank" rel="nofollow noopener"><img decoding="async" src="https://notagrouch.com/wp-content/plugins/wp-inject/images/cc.png" /></a></small></figcaption></figure></p>
<p>There was also a technical challenge with setting up an SSL certificate in a shared hosting environment. I won't get into the details of it but it's a bit of a challenge to make a certificate work when there are shared accounts under one IP address --the way that most shared hosting works.</p>
<h2>SSL is now free... mostly</h2>
<p>But recently a few companies have surfaced that provide free SSL certificates, and they take care of the technical issues regarding multiple websites under one IP address and one server.</p>
<p>For the free SSL certificates offered by these companies to work, your host has to support their process. Both of my preferred hosting companies did not support this fully, until recently. <a href="http://oglink.it/greengeeks" target="_blank" rel="noopener">Greengeeks</a> and <a href="http://oglink.it/inmotion" target="_blank" rel="noopener">Inmotion</a> required that you have a dedicated IP and at least a virtual server in order to install an SSL certificate, and you had to purchase it from them or from a 3rd party.</p>
<p>But to my delight and yours, Inmotion has just enabled the use of free SSL certificates in all of their service plans.</p>
<p><img decoding="async" src="https://media.giphy.com/media/26tPo1I4XyWzIBjFe/giphy.gif" /></p>
<h2>Quick guide on how to set up free SSL for your Inmotion hosting</h2>
<p>If you have a shared hosting account, you'll find detailed instructions on <a href="http://inmotion-hosting.evyy.net/c/393218/260033/4222?subId1=nagblog&u=http%3A%2F%2Fwww.inmotionhosting.com%2Fsupport%2Fwebsite%2Fcpanel%2Fauto-ssl-guide" target="_blank" rel="noopener">how to setup the SSL certificate here</a>. If you have a VPS account then you'll need to <a href="http://inmotion-hosting.evyy.net/c/393218/260033/4222?subId1=nagblog&u=http%3A%2F%2Fwww.inmotionhosting.com%2Fsupport%2Fedu%2Fwhm%2Fcreating-and-managing-accounts%2Fusing-auto-ssl" target="_blank" rel="noopener">follow this guide instead</a>.</p>
<p>In the process of doing this for my own VPS, I only had an issue with the guide because I had forgotten how to login to WHM as the root user. I tend to use SSH and I have that setup without the need for a password. But I was able to look up my password on <a href="http://oglink.it/lastpass" target="_blank" rel="noopener">LastPass</a> and a few moments later, I was logged in.</p>
<p>To login as the root user, you need to go to the WHM address for your server directly and enter the root username and password. The URL for your WHM panel should be something like this: https://serverid.inmotionhosting.com:2087.</p>
<p>If you have any trouble with this, just open up a support chat with them and they'll help you right away. After I enabled auto SSL in my account, it took about 30 minutes for the SSL certificates to be ready.</p>
<p><img decoding="async" src="https://media.giphy.com/media/NaboQwhxK3gMU/giphy.gif" /></p>
<p>I was expecting the process to be more complicated than this, but it wasn't. The next step was to activate the certificate on my WordPress blog, here at Notagrouch.com.</p>
<p>To "turn on" the certificate for WordPress, I used a popular plugin that takes care of most of it. The plugin is <a href="http://oglink.it/simplessl" target="_blank" rel="noopener">Really Simple SSL</a>. If you want to follow my steps, then install and activate the plugin (<a href="http://howtoblogtutorials.com/how-to-install-and-activate-a-plugin-for-your-blog/" target="_blank" rel="noopener">instructions here</a>).</p>
<p>Once the plugin is active, go to the Settings area in your WordPress dashboard and click on SSL. Then click on enable SSL.</p>
<p>Your settings screen should look like this afterwards:</p>
<p><a href="https://notagrouch.com/wp-content/uploads/really-simple-ssl-enabled.jpg"><img fetchpriority="high" decoding="async" class="size-large wp-image-50507 aligncenter" src="https://notagrouch.com/wp-content/uploads/really-simple-ssl-enabled-870x266.jpg" alt="" width="870" height="266" /></a></p>
<p>The settings tab in the configuration screen also has a few options. Ideally, you should make the plugin work by using the htaccess configuration instead of the WordPress or Javascript options.</p>
<p>If everything works fine, you may want to try switching to using htaccess for a slight performance boost.</p>
<p>Once everything is installed and configured, you may get kicked out of the WordPress dashboard. This is expected, and you just need to log back in. Notice that when you log back in, you'll be accessing your site via "https" instead of regular "http."</p>
<p>To verify the plugin is working, just visit any page on your blog and look to make sure your browser shows that the connection is secure and the protocol (the part before the URL) says https.</p>
<h2>Conclusion</h2>
<p>Inmotion introduced free SSL for all plans. It's easy to install, follow the instructions for shared hosting accounts or VPS accounts. You can then use a plugin to activate the SSL on your WordPress website. Voila!</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/get-free-ssl-certificate-inmotion-hosting/">How to Get Free SSL Certificate from Inmotion Hosting</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://notagrouch.com/get-free-ssl-certificate-inmotion-hosting/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Keeping your Online Activities Safe</title>
		<link>https://notagrouch.com/keeping-online-activities-safe/</link>
		
		<dc:creator><![CDATA[Oscar Gonzalez]]></dc:creator>
		<pubDate>Mon, 14 Mar 2016 12:18:35 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://notagrouch.com/?p=47408</guid>

					<description><![CDATA[<p>This blogpost has nothing to do with making money or internet marketing, but has everything to do with keeping your money and your person online, safe, or I should say safer. This is especially important to internet marketers, webmaster, website owner, business owners and other people that use the internet daily for multiple purposes. I have...</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/keeping-online-activities-safe/">Keeping your Online Activities Safe</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This blogpost has nothing to do with making money or internet marketing, but has everything to do with keeping your money and your person online, safe, or I should say safer. This is especially important to internet marketers, webmaster, website owner, business owners and other people that use the internet daily for multiple purposes.</p>
<p>I have worked with hundreds of people over the past few years. In the process of building a sales funnel, or a website or working on their email marketing, I get access to their usernames and passwords.</p>
<p>And I see a problem that has been happening since 1999 when I first worked on a client account. Chances are this applies to you at least to some degree.<br />
Back in 2005 my identity was stolen. It wasn't stolen digitally, but the process of recovering it and cleaning it up sucked. And it sucked up a big portion out of 3+ years of my life with weekly and monthly calls with police and creditors and debtors and all that fun stuff.<br />
10 years later, now everybody that does anything online faces the same risk of identity theft. Please take this seriously and read on...</p>
<div class="mceTemp">
<p><img decoding="async" title="Identity Theft by GotCredit" src="http://notagrouch.com/wp-content/uploads/16794969011_1b7d649fb4_b_identity-theft.jpg" alt="identity theft photo" width="1024" height="560" /></p>
<p>It sucked to have my identity stolen. Now it can happen to anyone with access to just one or two accounts. Do NOT share passwords.<br />
<small><a style="text-decoration: none;" title="Image inserted by the ImageInject WordPress plugin" href="http://wpinject.com/" rel="nofollow noopener" target="_blank">Photo</a> by GotCredit <a title="Attribution License" href="http://creativecommons.org/licenses/by/2.0/" target="_blank" rel="nofollow noopener"><img decoding="async" src="http://notagrouch.com/wp-content/plugins/wp-inject/images/cc.png" alt="" /></a></small></p>
</div>
<p><strong>First of all, when you are working with a 3rd party, you must change your usernames and passwords for all accounts that were shared as soon as that assignment or engagement is over. That includes, developers, designers, "wordpress pople," "seo people," or whoever.<br />
</strong></p>
<p>So if your developer finishes your website and gives it to you on Monday, the 1st of the month, then before that day is over, you should have already changed all the usernames and passwords related to that project.</p>
<p>Unless of course the developer will continue working or accessing the site for additional work, but that should go unsaid.</p>
<p>You should change all the passwords, not because you're afraid of your developer or wordpress person or whoever it may be, but because you want to make sure you're protected. You don't know if their systems are secure.</p>
<p>What if you shared the username and password with them via email, or chat, or skype, and someone is snooping around their computer? Now your security is at risk!</p>
<p>This is not a big problem if you just share one account. Maybe it's just the Aweber account or your cPanel account. You think it's not a big deal, that's <em>just</em> the email list account.</p>
<p>But it could be a really big problem and let me explain why.</p>
<h2>Don't share passwords with other accounts!</h2>
<p>Now that I told you to change passwords after anyone else besides you works on your accounts, the next thing you need to do is make sure your passwords are unique to each account.</p>
<p>So <em>what if</em> someone finds out that your Aweber password is "snoopy123"? Who cares, you think?</p>
<p><em>By the way, that is an actual password someone I worked with was using (for all their accounts). Well, most people that use weak passwords, also tend to use one password, or a few different passwords for ALL their accounts.</em></p>
<p>That's the other big problem. <strong>You should not do share passwords with multiple accounts</strong>. The reason should become obvious really soon --if it wasn't already.</p>
<p>Here's the setting:</p>
<div>
<p style="padding-left: 30px;"><em>Imagine I'm a shady character, snooping around for information and I got a hold of your computer. The method of entering  your digital world can be any of many, like: you left your laptop open at a coffee shop while you went to the restroom and there's a line at the door; or your laptop was left behind and I have it for the night until you pick it up in the morning; or you lost your cell phone and I guessed your password, or worse, you didn't have one; getting access to your "world" is trivial if you aren't protecting yourself in all fronts.</em></p>
<p>If I'm snooping around your computer and I find that your account for Aweber is: <strong>example@example.com</strong> and the password is <strong>myshorshorts1972.</strong> I found it just by searching for "username" in your skype account. Turns out you shared this info with your marketing manager over a chat in skype about 9 months ago.</p>
<div class="mceTemp">
<p><img decoding="async" title="Burglar Bill at large by f4niko" src="http://notagrouch.com/wp-content/uploads/7032193665_279af9bb40_m_burglar.jpg" alt="burglar photo" width="199" /></p>
<p><small><a style="text-decoration: none;" title="Image inserted by the ImageInject WordPress plugin" href="http://wpinject.com/" rel="nofollow noopener" target="_blank">Photo</a> by <a href="http://www.flickr.com/photos/72698176@N08/7032193665" target="_blank" rel="noopener">f4niko</a> <a title="Attribution-ShareAlike License" href="http://creativecommons.org/licenses/by-sa/2.0/" target="_blank" rel="nofollow noopener"><img decoding="async" src="http://notagrouch.com/wp-content/plugins/wp-inject/images/cc.png" alt="" /></a></small></p>
</div>
<p>But If I'm trying to steal your identity or access to another one of your accounts, I now have more information to guess or obtain even more information about you from other accounts.</p>
<p>I am just going to try other accounts using the same username and password combination I "snooped" from the skype conversation account. And I would try your website, your gmail account, and other ones.</p>
<p>If I wanted to steal your identity, I now would have one email & password combination, along with a physical address (got it from the Aweber account right?). And if I guess your access to another account, I will get whatever personal details from <em>that</em> account as well.</p>
<p>As a quick side note but in a related topic, go get a copy of this book and read it. You'll be amazed at how someone can totally take over by making a few phone calls. Try to get your hands on <a href="http://amzn.to/1Xo7OaG" target="_blank" rel="noopener">The Art of Deception by Kevin Mitnick</a>.</p>
<p>Eventually I can get into your main email account and then, <em>checkmate</em>, all your bases belong to us. I would have a chance to steal your whole identity at that point. And if I did it carefully, you would not know about it for years to come!</p>
<p>Now, do you understand why I don't want you to share account passwords with other accounts? And do you understand why I want you to change your passwords regularly?</p>
<p>With every account that uses the same password another account already has, you increase your vulnerability level. Stop doing it, and stop doing it today!</p>
<p>If you're thinking: <em>geez Oscar, that's a lot of work...</em></p>
<p>Going through all the accounts you have, changing their password to something strong and secure, like "#7E1Lg4!Gq5LQj4f" <em>is</em> a lot of work, but you don't have to do it all by yourself and all at once. There's an app for that!</p>
<p>I sent a version of this blogpost to my email list recently and the whole point was the next part of this whole thing.</p>
<p>Get an app to help you. The app <a href="http://oglink.it/lastpass-blog" target="_blank" rel="noopener">I recommend is LastPass</a> and it's pretty awesome. LastPass has 2 versions, the free one and the paid version. The free version is good if you do most of your work on a desktop or latptop. But if you use your phone for a lot of work, or a tablet, then I recommend you get the paid version because that will give you full access and functionality in the mobile version of the app.</p>
<p>The biggest downside to using the free version of LastPass in your mobile device is that you have to manually copy the username and password into each app or website, so the integration is not there. The paid version fixes this.</p>
<p>Before <a href="http://notagrouch.com/instagram-added-multiple-account-login-heres-how-you-activate-it/">Instagram allowed me to switch accounts within their own app</a>, this was the only way I could switch between 3 or 4 Instagram accounts, just let Lastpass manage it for me.</p>
<h2>GET LastPass installed and configured already!</h2>
<p>I've mentioned LastPass before, I talk about it in person with all my clients. LastPass manages your usernames and passwords and keeps them locked away under a master password.</p>
<p>The usernames and passwords for all your accounts and websites will magically get filled in whenever you need them. It works even if you have multiple accounts in one website. For example, I manage client's accounts in <a href="http://oglink.it/leadpages-blog" target="_blank" rel="noopener">Leadpages</a>, and <a href="http://oglink.it/aweber-blog" target="_blank" rel="noopener">Aweber</a>, <a href="http://oglink.it/optinmonster-blog" target="_blank" rel="noopener">Optinmonster</a>, various <a href="http://oglink.it/inmotion-blog" target="_blank" rel="noopener">cPanel accounts</a> and more. I keep track of all these usernames and passwords using LastPass.</p>
<p>Whenever I visit the site, LastPass automatically knows which username and password to use. It just needs to learn once each time for each website. If I go to a website and I create a new username and password, then LastPass will offer to create a strong password and use that.</p>
<p>You get to configure the settings for the password security. I use all the characters, and minimum of 16 characters, sometimes I go to 20.</p>
<p>A while ago I made a video about this. Although the interface has changed slightly, the basics still apply. Here's the video:</p>
<div class="entry-content-asset videofit"><iframe title="LastPass Manages multiple usernames and passwords for you" width="720" height="405" src="https://www.youtube.com/embed/vrySV4g_5gs?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></div>
<h2>But it's useful for more than just usernames and passwords</h2>
<p>LastPass also helps you fill out comment forms, and shipping or order forms. It has a built in form manager that you can use and customize. I use it to fill in comments for various websites and blogs. That way I can leave a comment as the author that makes most sense, like my personal blog, or my daddy blog, or another more relevant blog.</p>
<p>If I want to order something I order in a regular basis, I can create a <em>ship to</em> profile that will have all my information ready to go so I don't have to type it in or look it up. This would be really good for someone that has to ship stuff to different addresses every week.</p>
<h2>Secure Notes</h2>
<p>The other purpose is that it has secure notes as another feature you can use. This is just like a notepad, but it's encrypted and secure behind your master password. You can use this to save the family's vitals, your driver's license, your vehicle's VIN, your map to the treasure, whatever.</p>
<p>Please stop using the same password for every account, and stop using silly mickey-mouse passwords. Use a strong password generator, and then use a password manager like LastPass to keep it all organized for you.</p>
<div class="mceTemp">
<p><img decoding="async" title="Ytheb_1b by gvgoebel" src="http://notagrouch.com/wp-content/uploads/7606239970_f2ef093f12_b_cryptography.jpg" alt="cryptography photo" width="1024" height="814" /></p>
<p>Aren't you glad you don't have to use one of these to encrypt and decrypt messages and notes? You can just write them in LastPass and lock them up!<br />
<small><a style="text-decoration: none;" title="Image inserted by the ImageInject WordPress plugin" href="http://wpinject.com/" rel="nofollow noopener" target="_blank">Photo</a> by <a href="http://www.flickr.com/photos/37467370@N08/7606239970" target="_blank" rel="noopener">gvgoebel</a> <a title="Attribution-ShareAlike License" href="http://creativecommons.org/licenses/by-sa/2.0/" target="_blank" rel="nofollow noopener"><img decoding="async" src="http://notagrouch.com/wp-content/plugins/wp-inject/images/cc.png" alt="" /></a></small></p>
</div>
<h2>The Wrap Up</h2>
<p>You can find all kinds of alternatives and all of them have their upsides and downsides. I've tried them all, and settled with LastPass for a few reasons: It's platform agnostic, it's one of, or maybe the most secure one out there, the premium version is inexpensive, and I can securely share login information with others without having to share the actual password. Yeah, try that on for size!</p>
<p>If you want to explore other ones anyway, the other ones that are good are: <a href="https://agilebits.com/onepassword" target="_blank" rel="noopener">1Password</a>, <a href="http://keepass.info/" target="_blank" rel="noopener">KeePass (local file only; no integration)</a>. And <a href="http://lifehacker.com/5529133/five-best-password-managers" target="_blank" rel="noopener">Lifehacker has a list of 5 best password managers</a>. So you can decide. If you ask me, <a href="http://oglink.it/lastpass-blog" target="_blank" rel="noopener">go with LastPass</a>.</p>
<p>I would recommend you get LastPass for all the reasons I mentioned earlier. Price, features, portability, accessibility and availability. But at the end of the day, I just want you to be safe so lock up your passwords anyway you can using one of these apps, start doing it today!</p>
</div>
<p>The post <a rel="nofollow" href="https://notagrouch.com/keeping-online-activities-safe/">Keeping your Online Activities Safe</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Your Password will fail you. Here&#8217;s how you mitigate the damage.</title>
		<link>https://notagrouch.com/your-password-will-fail-you-heres-how-you-mitigate-the-damage/</link>
		
		<dc:creator><![CDATA[Oscar Gonzalez]]></dc:creator>
		<pubDate>Mon, 22 Jul 2013 10:43:32 +0000</pubDate>
				<category><![CDATA[Opinion and Editorial]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://notagrouch.com/?p=36338</guid>

					<description><![CDATA[<p>Recently there has been a series of hacking attacks to several websites, and recently Tumblr released an update to their mobile app to address a security problem. Even if you follow their advice to update your password, the problems with most passwords is that they're insecure, and or they are used in a dangerous way....</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/your-password-will-fail-you-heres-how-you-mitigate-the-damage/">Your Password will fail you. Here&#8217;s how you mitigate the damage.</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Recently there has been a series of hacking attacks to several websites, and recently Tumblr released an update to their mobile app to address a security problem. Even if you follow their advice to update your password, the problems with most passwords is that they're insecure, and or they are used in a dangerous way.</p>
<p>Most people I've ever worked for or worked with keep very insecure passwords. But don't take it from me, check out the <a href="http://gizmodo.com/5954372/the-25-most-popular-passwords-of-2012" target="_blank" rel="nofollow noopener">most used passwords for 2012</a>. I often shake my head when someone gives me their password to work in their accounts. Their passwords are so weak! There are many ways of keeping your passwords safe and secure. But as attacks become more and more widespread, chances are that your password will be stolen or guessed at one point or another.</p>
<p>I recently had my Twitter account hacked and after investigating quite a bit, I still can't find how the perpetrators got a hold of my account. One more morning there were about 20 updates in Russian. I was alerted to this issue by a couple of friends in Twitter. Perhaps someone got a hold of my password, or maybe an account I granted permissions for in Twitter got hacked. For the record, I use passwords that are very "secure" with 12 - 20 characters using the full set of characters available, so I doubt that my Twitter passwords was guessed.</p>
<p><a href="http://notagrouch.com/wp-content/uploads/2013/07/security-threat.jpg"><img loading="lazy" decoding="async" class="size-large wp-image-36347" alt="image by: shutterstock" src="http://notagrouch.com/wp-content/uploads/2013/07/security-threat-640x414.jpg" width="640" height="414" /></a></p>
<p>In any case I'm proud to say that this is the first successful hacking attempt at any of my online profiles or accounts. Ever. That's pretty good for someone that has been online for about 13 years I would say.</p>
<p>But obviously, nobody is exempt. You could be the target of the next attack, or simply be part of a database that will be stolen tomorrow. <em>So how do you mitigate the damage, or at best prevent it from happening?</em></p>
<p><strong>Use Lastpass</strong>. <a title="The hackers know this, but do you?" href="http://notagrouch.com/secure-webserver/" target="_blank" rel="nofollow">I've blogged about LastPass</a> before, but I'll remind you what it is all about.</p>
<p><a href="http://lastpass.com" target="_blank" rel="nofollow noopener">Lastpass</a> is an easy to use, and free password manager application that works on any computer and with most web browsers. Its job is to give you a secure password whenever you need it and to save your username and password combinations for any website you use. Lastpass itself is highly encrypted and only your master password can unlock your account.</p>
<p>It is the best thing you can use to manage your passwords and keep unique passwords across all your accounts. <strong>Why use unique passwords?</strong> Most people use 2 - 5 passwords and they use them for all their accounts. This seems like a good idea, because you're using "different passwords right"? Wrong! Every user account should have its own password, unique from every other account. The reason is very simple in fact. Let's say you have six accounts; 2 bank accounts, 3 social media and a game you like to play online. If you share passwords between 3 accounts for example, a would be hacker only needs to break into one of your accounts to obtain the password.</p>
<p>The moment a hacker gets a hold of your password, you can be sure they're going to try that same password for all your known accounts, including email, instant messaging, banking, social media, etcetera. <strong>This is why you should always have unique passwords for every account</strong>. This seems like a daunting task, but if you use a good password manager then it should be very easy to achieve this goal.</p>
<p><a href="http://staff.tumblr.com/post/55648373578/important-security-update-for-iphone-ipad-users" target="_blank" rel="nofollow noopener">Tumblr announced a security update to their software</a> recently and they advised you to change your password. That's also a good idea, but if you had missed the announcement, you could rest assured that only one of your accounts would be compromised if your password got stolen by whatever means.</p>
<p>If you have a blog, social media profile, online bank account, instant messaging, even just a simple game. Use LastPass to access it. When you join a new website and create a new profile, use the lastpass password generator to create a random password that is strong. When you login, LastPass will ask if you want to save your username and password and you should.</p>
<p>Don't forget to keep the master password for LastPass really strong, and logout of the app, extension or website whenever you use it to minimize the risk of having your accounts hacked. Lastpass also has a security audit feature that gives you an overall grade on your accounts and helps you fix some of the most common problems.</p>
<p>I highly recommend this! If you aren't using a password manager already, you should and I strongly recommend you check out Lastpass. Set it up, use it. Just don't ever forget your master password.</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/your-password-will-fail-you-heres-how-you-mitigate-the-damage/">Your Password will fail you. Here&#8217;s how you mitigate the damage.</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Wordcamp Orange County recap. WCOC in Tweets.</title>
		<link>https://notagrouch.com/wordcamp-orange-county-recap-wcoc-in-tweets/</link>
		
		<dc:creator><![CDATA[Oscar Gonzalez]]></dc:creator>
		<pubDate>Sat, 02 Jun 2012 21:48:05 +0000</pubDate>
				<category><![CDATA[WordPress]]></category>
		<category><![CDATA[Instagram]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[wordpress]]></category>
		<guid isPermaLink="false">http://notagrouch.com/?p=31859</guid>

					<description><![CDATA[<p>Some tweets and commentary from Wordcamp Orange County I got to attend Wordcamp Orange County, and here are some of the highlights in forms of tweets and commentary. I tried to do this earlier this rmorning but the wifi at #wcoc wasn't working. Ross Teasley - @RossTeasley At #wcoc @notagrouch is plugged in, literally n...</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/wordcamp-orange-county-recap-wcoc-in-tweets/">Wordcamp Orange County recap. WCOC in Tweets.</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="http://notagrouch.com/wp-content/uploads/2012/06/wcoc-twitter.jpg"><img decoding="async" class="aligncenter size-full wp-image-31979" title="wcoc-twitter" src="http://notagrouch.com/wp-content/uploads/2012/06/wcoc-twitter.jpg" alt="" width="600" /></a></p>
<h3>Some tweets and commentary from Wordcamp Orange County</h3>
<p>I got to attend Wordcamp Orange County, and here are some of the highlights in forms of tweets and commentary. I tried to do this earlier this rmorning but the wifi at #wcoc wasn't working.</p>
<blockquote class="curated"><p>Ross Teasley - @<a href="http://twitter.com/" target="_blank" rel="noopener">RossTeasley</a><br />
At #wcoc @notagrouch is plugged in, literally n figuratively. http://t.co/n67W0O98</p></blockquote>
<blockquote class="curated"><p>Jeremy Lehman - @<a href="http://twitter.com/" target="_blank" rel="noopener">jeremylehman</a><br />
Looks like all the cool people are in the end-user awareness session #wcoc #imnotcool</p></blockquote>
<blockquote class="curated"><p>Jason Tucker - @<a href="http://twitter.com/" target="_blank" rel="noopener">jasontucker</a><br />
Playing around with some query and some instagram libs: #WCOC Instagram wall <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /> http://t.co/SFbjKONn</p>
</blockquote>
<p>Jason put together a nice streaming wall of instagram photos from #WCOC. check it out, definitely cool stuff.</p>
<blockquote class="curated"><p>alex vasquez - @<a href="http://twitter.com/" target="_blank" rel="noopener">alexjvasquez</a><br />
I like hearing people say my name. #wcoc preso @zengy</p></blockquote>
<p>Steve Zenghut from Zeek saved the day and presented on WP-Multisite and Alex became the example for the user, sites and stuff. Alex liked this. :p</p>
<blockquote class="curated"><p>Oscar Gonzalez - @<a href="http://twitter.com/" target="_blank" rel="noopener">notagrouch</a><br />
This broken wifi business is starting to suck at #wcoc</p></blockquote>
<p>The WiFi system was unavailable for a long time, just around 2:00 @thefrosty seems to have fixed it. Woot... live blogging and curation with @dashter is now live!</p>
<blockquote class="curated"><p>Kathy Burckhardt - @<a href="http://twitter.com/" target="_blank" rel="noopener">kmburck</a><br />
RT @perezbox: My WordCamp Orange County 2012 – WordPress Security Presentation http://t.co/rKq5DsUX #wcoc #wordpress #security</p></blockquote>
<p>Recap in case you missed the security session at #WCOC "End-user Awareness"</p>
<p>This post was generated by Dashter</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/wordcamp-orange-county-recap-wcoc-in-tweets/">Wordcamp Orange County recap. WCOC in Tweets.</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Much will the Boeing Phone Cost?</title>
		<link>https://notagrouch.com/how-much-will-the-boeing-phone-cost/</link>
		
		<dc:creator><![CDATA[Oscar Gonzalez]]></dc:creator>
		<pubDate>Fri, 13 Apr 2012 13:19:52 +0000</pubDate>
				<category><![CDATA[Opinion and Editorial]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://notagrouch.com/?p=30157</guid>

					<description><![CDATA[<p>Amazing what the fear for your privacy will do. Need a secure phone? Enter the Boeing phone. Yes, Boeing is about to enter the market of mobile devices. There's little known about the ubersecure mobile device that Boeing is making. One thing is for sure, you won't be able to afford it anytime soon. Well,...</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/how-much-will-the-boeing-phone-cost/">How Much will the Boeing Phone Cost?</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Amazing what the fear for your privacy will do. Need a secure phone? Enter the Boeing phone. Yes, Boeing is about to enter the market of mobile devices. There's little known about the ubersecure mobile device that Boeing is making. One thing is for sure, you won't be able to afford it anytime soon. Well, maybe, if you're rich. My guess? 5000 to 8000 dollars per device.</p>
<p>Apparently this phone that Boeing Co. is developing and is ready to release soon will compete with existing secure mobile phones. An example of a secure phone is the Blackberry Barack Obama uses. Other leaders of state, major CEOs and security aware millionaires are already using secure devices in their day to day activities. Will Boeing bring a viable and successful alternative to the choices these moguls have? We'll see.</p>
<blockquote><p>The Boeing Co. is developing a mobile phone based on the Android operating system that will compete with other manufacturers offering highly secure communication devices, company officials said April 10. Roger Krone, president of Boeing Network and Space Systems, told reporters in Arlington, Va., that this was probably the first time the aerospace and defense industry giant will offer a communication device designed to use cellular networks. The company is near the end of the development cycle and getting ready to launch what he called “the Boeing phone” in late 2012, said Brian Palma, vice president of the company’s secure infrastructure group.</p>
<p>via Boeing to Jump into the Mobile Phone Business - Blog.</p></blockquote>
<p>The post <a rel="nofollow" href="https://notagrouch.com/how-much-will-the-boeing-phone-cost/">How Much will the Boeing Phone Cost?</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Boss Contests Hack the Heck out of Chrome</title>
		<link>https://notagrouch.com/boss-contests-hack-the-heck-out-of-chrome/</link>
		
		<dc:creator><![CDATA[Oscar Gonzalez]]></dc:creator>
		<pubDate>Fri, 09 Mar 2012 01:01:57 +0000</pubDate>
				<category><![CDATA[Opinion and Editorial]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://notagrouch.com/?p=30046</guid>

					<description><![CDATA[<p>Interesting article I came across. Lots of money to be made if you are the top hacker, and even more so if you got the skills and bawls to sell your findings to the top bidder. That's boss. But Vupen CEO Chaouki Bekrar says he has no intention of turning over details of the sandbox...</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/boss-contests-hack-the-heck-out-of-chrome/">Boss Contests Hack the Heck out of Chrome</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Interesting article I came across. Lots of money to be made if you are the top hacker, and even more so if you got the skills and bawls to sell your findings to the top bidder. That's boss.</p>
<blockquote><p>But Vupen CEO Chaouki Bekrar says he has no intention of turning over details of the sandbox escape. "That vulnerability is very rare. We'll keep it for our own customers," says Bekrar.</p>
<p>Vupen sells exploits against browsers to its clients, mainly government covert agencies from countries around the world. "That's life," he says.</p></blockquote>
<p>via Contests hack the heck out of Chrome.</p>
<p>That quote, that's total boss!</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/boss-contests-hack-the-heck-out-of-chrome/">Boss Contests Hack the Heck out of Chrome</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>OSCAR Security Event Management</title>
		<link>https://notagrouch.com/oscar-security-event-management-a-new-kid-in-town/</link>
					<comments>https://notagrouch.com/oscar-security-event-management-a-new-kid-in-town/#comments</comments>
		
		<dc:creator><![CDATA[Oscar Gonzalez]]></dc:creator>
		<pubDate>Mon, 06 Feb 2012 17:21:03 +0000</pubDate>
				<category><![CDATA[Opinion and Editorial]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://notagrouch.com/?p=29727</guid>

					<description><![CDATA[<p>An exclusive look and commentary about OSCAR.</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/oscar-security-event-management-a-new-kid-in-town/">OSCAR Security Event Management</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>What is OSCAR? OSCAR is a new virtual appliance based application that helps you detect security events rapidly. Think of it as a modern virtual intelligent IDS. Yes, I said intelligent, because it self learns.</p>
<p>OSCAR promises to find anomalies on your logs and alert you of them, faster, and more accurately than a security professional could do, and at a fraction of the cost. Having someone parse through logs on an ongoing daily basis for example, is very expensive, so much so that only big data centers and high-tech firms can afford the 70 - 150K range for a security professional like this. Not to mention that this task is usually a waste of time for someone with the skillset to actually do it. Ironic is it not?</p>
<p><img loading="lazy" decoding="async" class="alignright size-medium wp-image-29728" title="OSCAR-Security-event-management" src="http://notagrouch.com/wp-content/uploads/2012/02/OSCAR-Security-event-management-280x122.jpg" alt="" width="280" height="122" />OSCAR claims to do this job much cheaper, better and faster. OSCAR is still in beta as of this writing, but to be frank, this is not going to be your normal webapp or virtual appliance that the general population will use. But if you're running a start-up, if you have a hosting service or manage a lot of applications, OSCAR may just be what you need. Check them out, they're accepting applicants to their beta program right now.</p>
<p>Some of things that made this very interesting to me:<br />
<strong>Freemium model</strong>! It doesn't require a point to point VPN. You don't have send your syslogs to them. It uses standard SSH so it's secure and easy to implement. It will alert you via email, so you can then route that to your favorite device. And it has an easy to use Dashboard. All winner points on my book. Their alert system is based on "<em>automated anomaly detection</em>" which means it follows patterns and picks out the anomalies; brilliant.</p>
<p>Let's see how this develops, and if you want to want to take it for a spin, join the beta program.</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/oscar-security-event-management-a-new-kid-in-town/">OSCAR Security Event Management</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://notagrouch.com/oscar-security-event-management-a-new-kid-in-town/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>The hackers know this, but do you?</title>
		<link>https://notagrouch.com/secure-webserver/</link>
					<comments>https://notagrouch.com/secure-webserver/#comments</comments>
		
		<dc:creator><![CDATA[Oscar Gonzalez]]></dc:creator>
		<pubDate>Thu, 08 Jul 2010 15:57:03 +0000</pubDate>
				<category><![CDATA[Systems Administration Blog]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://notagrouch.com/?p=13074</guid>

					<description><![CDATA[<p>Reality check Part of your job as a System Administrator or Website administrator is to ensure the work you do is safe from attacks and vulnerabilities. Remember that movie where Michael Moore goes around in Canada trying to open doors because he heard that people there don't lock their doors? Do you remember what happened?...</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/secure-webserver/">The hackers know this, but do you?</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 class="">Reality check</h2>
<p>Part of your job as a System Administrator or Website administrator is to ensure the work you do is safe from attacks and vulnerabilities. Remember that movie where Michael Moore goes around in Canada trying to open doors because he heard that people there don't lock their doors? Do you remember what happened? It was true, many people simply didn't lock their doors and he waltzed right in to their living rooms. Michael Moore seems like a nice enough guy so it wasn't a big deal, but in the Internet people aren't that nice. In fact they're malicious, as many nice people as you know there are hundreds more literally <em>out to get you</em>, or rather, your webserver.</p>
<h2 class="">You're not in Canada</h2>
<p>Leaving your server unprotected is like leaving your brand new car with your wallet on the dashboard in a crowded metropolitan city, like NY, Tokyo, Paris --someone is going to take it. People are looking for weaknesses and will take all you've got if you give them a chance.</p>
<h2 class="">Protect your server</h2>
<p>Here are tips and advice to lock down your webserver and other stuff you might have running on it.</p>
<p>First things first. You have to address the underlying base first, the operating system. If your foundation is weak, it doesn't matter how strong your application is.</p>
<ol>
<ol>
<li><strong>Remove un-needed users</strong>. As you provision your server, you may find that you've created a user to test <em>this</em>, or <em>that</em>, if you don't need a user, check the user's home directory and make a backup of any files you need, then nuke that account. There isn't a <em>maybe</em> option here. You either <strong>need it</strong> or you <strong>don't</strong>.</li>
<li><strong>Establish a strong password for the remaining users</strong>. I know its convenient for you to create a user and give it the usual password you like; this isn't good. Instead of using a known password, use a strong password generator and change the passwords in any account that has login capabilities. <strong><em>Do NOT</em></strong>, I repeat do not write it down, email it or give it to someone else. Instead, use a password manager to save it safely and protect your password manager with a strong master password. <a href="http://lastpass.com" rel="nofollow noopener" target="_blank">LastPass</a> for example allows you not only to lock your password database with a master password, but it also lets you lock down an individual record with one more prompt of your master password, just in case you forgot to log out or something when you go to get a cup of coffee and things like that.</li>
</ol>
</ol>
<p><img loading="lazy" decoding="async" class="alignright size-full wp-image-13093" title="locks" src="http://notagrouch.com/wp-content/uploads/2010/07/locks2.jpg" alt="" width="288" height="384" /></p>
<ol>
<ol>
<li><strong>Remove the ability to login for system and application users</strong>. Apache, MySQL, Postfix, and other applications have or require their own username to run properly. Chances are these users don't actually need</li>
<li><strong>Update & configure SSH</strong></li>
</ol>
</ol>
<p>. Linux distributions are getting smarter about shipping ssh configs with better settings than they did years ago, but it is still your responsibility to ensure the settings are properly configured for your environment. Furthermore, check for updates on a regular basis and stay on top of those.</p>
<ol>
<ol>
<li><strong>Do not share passwords</strong></li>
</ol>
</ol>
<p>. It is easy to give someone your username and password to <em>do something really quick</em>, then forget about it. Presumably, you trust this person, but what if they happen to write down the password somewhere, or save somewhere where it is insecure to do so. You see, they could become the targets for someone to get <strong>your</strong> password.</p>
<ol>
<li><strong>Configure your firewall to only allow exactly what is needed</strong>. Do I need to explain this one?</li>
</ol>
<p>To expand on this, soon I'll post info about hardening Apache, MySQL, Tomcat, Linux, as well as WordPress, vBulletin, Wikis, maybe even Joomla and Drupal.</p>
<p>This is the first draft of a series of guides I'll be writing on how to lock down your stuff and hopefully make it more secure. Got a better way of doing things, why don't you <a class="" href="/contact">send me an email</a> or tell everyone in the comments below.</p>
<p><small>Photo by <a href="http://rinaz.net/2007/07/an-italian-vacation-part-3-ponte-milvio/" target="_blank" rel="noopener">Rinaz</a>, site seems to go up and down.</small></p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/secure-webserver/">The hackers know this, but do you?</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://notagrouch.com/secure-webserver/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>SSH Remote Host Identification has changed.</title>
		<link>https://notagrouch.com/ssh-remote-host-identification-changed/</link>
		
		<dc:creator><![CDATA[Oscar Gonzalez]]></dc:creator>
		<pubDate>Tue, 22 Sep 2009 17:26:57 +0000</pubDate>
				<category><![CDATA[Systems Administration Blog]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://notagrouch.com/?p=1068</guid>

					<description><![CDATA[<p>I often encounter the annoying warning shown below. WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! It most often happens when the machine which I'm trying to connect has been re-installed. There are other reasons why you might get this but the root cause of it is exactly what the warning says. Watch out! someone could be...</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/ssh-remote-host-identification-changed/">SSH Remote Host Identification has changed.</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I often encounter the annoying warning shown below.</p>
<p>WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!<br />
<img loading="lazy" decoding="async" src="http://notagrouch.com/wp-content/uploads/2009/09/host-identification-has-changed.png" alt="" title="host-identification-has-changed" width="518" height="242" class="aligncenter size-full wp-image-29161" /><br />
<span id="more-1068"></span></p>
<p>It most often happens when the machine which I'm trying to connect has been re-installed. There are other reasons why you might get this but the root cause of it is exactly what the warning says. Watch out! someone could be doing something NASTY! <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>More often than not, this is nothing more than an annoyance because I <em>know</em> that the system hasn't been compromised and there is no man in the middle attack. To fix this problem, usually you have two options: you can disable strict checking of the known_hosts file, and/or you could add an exception for the IP address(es) that you want. </p>
<p>The best way I found to get rid of this problem, without compromising the actual security check that this system provides is to actually use the <strong>ssk-keygen</strong> utility and alias it like this:</p>
<pre lang="bash">
alias ch='ssh-keygen -R'</pre>
<p>ch stands for "clean hosts" so its easy to remember. Now, next time I see the warning, instead of manually editing the known_hosts file, or adding insecure workarounds, I just run my alias and the IP Address in question. This removes the IP from the known_hosts file and lets you continue.</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/ssh-remote-host-identification-changed/">SSH Remote Host Identification has changed.</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>OS X Java update failed</title>
		<link>https://notagrouch.com/os-java-update-fail/</link>
		
		<dc:creator><![CDATA[Oscar Gonzalez]]></dc:creator>
		<pubDate></pubDate>
				<category><![CDATA[Systems Administration Blog]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://notagrouch.com/?p=430</guid>

					<description><![CDATA[<p>Recently the update for Java on my Macs failed to install. This is the first time I see an update from Apple not work on my machines. This happened both on my iMac and on my MacBook Pro. To fix this, I got the update directly from Apple and installed it manually, you can find...</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/os-java-update-fail/">OS X Java update failed</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Recently the update for Java on my Macs failed to install. This is the first time I see an update from Apple not work on my machines. This happened both on my iMac and on my MacBook Pro.</p>
<p>To fix this, I got the update directly from Apple and installed it manually, you can find it here:<br />
http://support.apple.com/downloads/Java_for_Mac_OS_X_10_5_Update_4</p>
<p>It all seemed to work fine after that, I just had to install it as a normal application. I'm not sure why this happened.</p>
<p>
<a href="https://notagrouch.com/wp-content/uploads/2009/06/Picture-56.png">Java for Mac OS X can't be installed</a>
<a href="https://notagrouch.com/wp-content/uploads/2009/06/Picture-55.png">Java Update Failed OSX</a>
<a href="https://notagrouch.com/wp-content/uploads/2009/06/Picture-57.png">Official Java download from Apple</a>
<a href="https://notagrouch.com/wp-content/uploads/2009/06/Picture-58.png">Java for Mac OS X 10.5 Update 4 package</a>
<a href="https://notagrouch.com/wp-content/uploads/2009/06/Picture-60.png">Usual yadda yadda to install</a>
<a href="https://notagrouch.com/wp-content/uploads/2009/06/Picture-64.png">Install Succeeded</a>
</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/os-java-update-fail/">OS X Java update failed</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Keep up with the latest WordPress version, its good for ya.</title>
		<link>https://notagrouch.com/wordpress-upgrade-is-nowavailable/</link>
		
		<dc:creator><![CDATA[Oscar Gonzalez]]></dc:creator>
		<pubDate>Tue, 15 Jul 2008 14:58:49 +0000</pubDate>
				<category><![CDATA[Opinion and Editorial]]></category>
		<category><![CDATA[plugins]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[wordpress]]></category>
		<guid isPermaLink="false">http://www.muychingon.com/?p=425</guid>

					<description><![CDATA[<p>The latest Wordpress version has been released. Polished and tweaked this gears up to be a great release.</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/wordpress-upgrade-is-nowavailable/">Keep up with the latest WordPress version, its good for ya.</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The <a title="Wordpress latest version download page" href="http://wordpress.org/download/" target="_blank" rel="noopener">latest WordPress</a> version has been released, and it comes loaded with dozens of cool features, bugfixes an  what I call "efficiency tweaks". Its worthwhile to get your site upgraded if you're using WordPress, remember, if you have a vanilla WordPress installation you can use the InstantUpgrade plugin and be on your way in under 30 secs. I just did it for this site. Or you can follow the <a title="Upgrade WordPress in 3 easy steps" href="http://codex.wordpress.org/Upgrading_WordPress" target="_blank" rel="noopener">easy upgrade instructions</a> directly from WordPress.org</p>
<p>Here are a few of the things that caught my eye in regards to the new features and changes:</p>
<ul>
<li>Revision system! while you're writing, you can go back to an earlier version of a draft, similar to the way Wikis work. It even allows for multiple author collaboration. Enterprise... here comes WordPress!</li>
<li>Captions to your images. It seems that this is now nicely integrated and actually displays the caption.</li>
<li>Live theme preview before you commit. You can preview then activate if you like it.</li>
<li>Gears integration - works with FF2, 3, IE 6 and 7 and support for Safari 3 is on its way.</li>
<li>A lot of little features that facilitate management and a few new features like more support for social<br />
media badges.</li>
<li>Select a range of check boxes with "shift-click." <strong>This is HUGE</strong>!</li>
</ul>
<p>It also appears that themes and plugins were mostly left alone; this means that if your themes and plugins work on 2.5.X then they should work on 2.6 seamlessly. Well anyway, there are over 194 bugs fixed in this version so its recommended that you update, especially for security reasons.</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/wordpress-upgrade-is-nowavailable/">Keep up with the latest WordPress version, its good for ya.</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Remote Desktop is not secure. Myth.</title>
		<link>https://notagrouch.com/remote-desktop-is-not-secure-myth/</link>
		
		<dc:creator><![CDATA[Oscar Gonzalez]]></dc:creator>
		<pubDate>Sun, 13 May 2007 03:32:58 +0000</pubDate>
				<category><![CDATA[Systems Administration Blog]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://notagrouch.com/?p=2789</guid>

					<description><![CDATA[<p>So I've been wrong for a while now about something. I always bought into the common assumption that Remote Desktop Protocol (RDP) is insecure. It actually is relatively secure. It is secure enough to keep your connections to Windows based computers safe from prying eyes and other threats. Waddaya know? Apparently for me, the answer...</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/remote-desktop-is-not-secure-myth/">Remote Desktop is not secure. Myth.</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>So I've been wrong for a while now about something. I always bought into the common assumption that Remote Desktop Protocol (RDP) is insecure. It actually is relatively secure. It is secure enough to keep your connections to Windows based computers safe from prying eyes and other threats. Waddaya know? Apparently for me, the answer is "nothing" eh.</p>
<p>Anyway. While I was doing some research into the matter I found several comments by Microsoft fan-boys that RDP was good enough to use. Forums in the tech community were filled with these comments. So I had to find out more about this and I did. I found several articles that support these comments.</p>
<p>One of the features of RDP is the <a href="http://en.wikipedia.org/wiki/RC4#RC4-based_cryptosystems" target="_blank" rel="noopener">use of RC4 encryption</a>. The same type of encryption sometimes used for SSL, Kerberos and a few other technologies. Of course, you should always make sure that both computers you are working with on this have the latest and greatest RDP client, and you must follow other standard security procedures like using safe passwords.</p>
<p>There's a slight chance that someone may setup a "man-in-the-middle" attack and try to decrypt your information. But Seriously? you think someone actually wants to go through the hassle of setting up this attack? Its expensive, time consuming, and usually reserved for multimillion dollar corporations or millionaires. Kurt, one of the bloogers I found talking about RDP put it best:</p>
<blockquote><p>To give you an idea of the sophistication we're talking about, this hacking technique is usually reserved for attacking eCommerce sites like eBay & financial institutions like Bank of America to intercept credit cards & passwords. If someone is in fact truly attempting to use this technique against you and your computer, it's not random: You or your organization is probably important enough (or rich enough) that skimping paying $50/year for LogMeIn Pro, $200/year for GoToMyPC, or whatever support service you might otherwise be using isn't exactly your first priority. Remember: This is your Mom we're talking about... not freakin' Bill Gates.</p></blockquote>
<p>I know that security through obscurity can be a fools errand, but you could try changing the port RDP runs on so you can prevent any automatic scripted attacks, or use some sort of port translation on your firewall --if you're connecting to a compuer across the internet. With that said, go forth and RDP into your home computer till you get sick of it. As far as the concerns for security with RDP, I think It's ok to use it.</p>
<p>The post <a rel="nofollow" href="https://notagrouch.com/remote-desktop-is-not-secure-myth/">Remote Desktop is not secure. Myth.</a> appeared first on <a rel="nofollow" href="https://notagrouch.com">Digital Marketing Through Content &amp; Influence</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
