Howtos / Articles

Secure MikroTik RouterOS Router via CLI

Mikrotik RouterOS devices are extremely powerful router devices. This can sometimes mean that the configuration of them isnt as simple as point and click for a new user. This howto will outline some recommended steps you can take to secure your Mikrotik RouterOS device, be it RouterBoard, a x86 install on bare metal, or a CHR (Cloud Hosted Router). This guide will not go into detail on configuring the firewall. That is more complex and is going to be heavily…

Read more [...]

Force .Net Application to run as 32 bit

If you have a .Net application that has been compiled with the target CPU option set to AnyCPU (as opposed to x86 / 32bit or x64 / 64bit specifically) and you are running a 64bit operating system, that application will automatically run as a 64bit process. If you run it on a 32bit machine, it will run in a 32bit mode. You can however change the CorFlags of the executable, to force it to run as a 32bit process, even…

Read more [...]

Generate SSH Keys on Windows with PuTTYGen (the PuTTY Key Generator)

To generate SSH public and private key pairs on Windows, one of the easiest tools to use, is the PuTTY Key Generator “puttygen.exe” (which can be downloaded from here). The resulting generated files from the PuTTY Key Generator can be used to set up public key authentication with a remote server, allowing for more secure authentication over normal password based authentication (requires disabling password based authentication). Download the PuTTY Key Generator You can download puttygen from the following url:…

Read more [...]

Using SSH Private Key Files with PuTTY

The following guide shows you how to log into a remote server using your private key file. It assumes you already have the associated public key already added into the remote hosts authorized_hosts file. Download PuTTY Download PuTTY if you don’t have it installed yet. You can download PuTTY from the following url: Open PuTTY Run Putty. You should be presented with a screen like this: Enter in the host name or IP address of the host you want…

Read more [...]

Generate SSH Public and Private Keys on Linux

SSH allows for both password based authentication, as well as public key authentication. Public key authentication is generally regarded as being more secure, as it isn’t as prone to brute force login attempts (if you disable password based authentication). The private key can also have a passphrase associated with it, which makes public key authentication even more secure if needed. Sometimes cloud servers will let you put a public key in as a authorized authentication key when the cloud server…

Read more [...]

Page 1 of 4112345678910...2030...Last »