Mount drives In Debian and Ubuntu

What does it means?

When we connect to our machine a drive we are used to see it immediately and to be able to access to it as it is plugged in.

Well this concept doesn’t work on every machines. If we have a server running and more often without graphical interface, for example, this is not going to happen on it’s own.

We have to run some commands before we can read this drive.
Lets see together how to do it.

NOTE: The content of this article doesn’t apply on drives whit NTFS file system.

Discover the connected drives

Firs we got to know the drives connected to our system and the name the system assigned them.

Keep on reading!

Secure SSH: basics for your security

Here we are again after my last security post about disabling root account on Ubuntu / Debian. This time I will bring you how I chose to implement some security best practice with OpenSSH on some machines I run with Linux based OS like Ubuntu, but works even with other Debian based distro.

In this guide I will try to explain how to secure a machine service widely used called OpenSSH from malicious attacks. They are usually performed using some vulnerabilities of a non proper configured system leaving your server or pc available to possible hacks.

What is OpenSSH?

OpenSSH or more simply ssh (secure socket shell) is a service hosted by a machine (server or host) which allow another PC (client) to connect to its shell.

Keep on reading!

Disabling root account on Ubuntu / Debian

Here we are with this new article which is going to explain how to secure your system disabling root account on Ubuntu / Debian preventing to everybody to access to your system with such a high grade allowing to perform malicious actions or make serial damages to your environment.

We are going through different steps and maybe many of them can result redundant but you may never know which will be the next flaw being discovered exposing even partially your system.

Who is root? and why is so important?

Root user is the first user you will find by default on your machine, he is the user which has the privileges of doing everything in your system and everyone (even the system owner) who is grant the access whit that role has the complete control on all the system and our first worries is to avoid to everybody, even our self if possible, to log in as root user.
This role is very critical when it comes to security and safety and we should do our best to respect it and protect it.

Keep on reading!