TCS logo TimburyDotOrg is owned and operated by Timbury Computer Services. For over ten years, Timbury Computer Services has shown home, small business and corporate clients how to use Linux and Open Source software to maximize efficiency and lower costs.

Updates: The TimburyDotNet web hosting site redesign is complete. Linux-only hosting!More...

Simple Server Hardening, Part II

Author: Kyle Rankin | Files under syndicated

In my last
, I talked about the classic, complicated approach to
server hardening you typically will find in many hardening documents and countered it
with some specific, simple hardening steps that are much more effective
and take a only few minutes. more>>


Flat File Encryption with OpenSSL and GPG

Author: Charles Fisher | Files under syndicated

The Pretty Good Privacy (PGP) application, which has long been known as a
primary tool for file encryption, commonly focused on email. It has
management tools for exchanging credentials with peers and creating secure
communication channels over untrusted networks. more>>


smbclient Security for Windows Printing and File Transfer

Author: Charles Fisher | Files under syndicated

Microsoft Windows is usually a presence in most computing environments, and UNIX
administrators likely will be forced to use resources in Windows networks from
time to time. Although many are familiar with the Samba server software, the matching
smbclient utility often escapes notice.


Hodge Podge

Author: Shawn Powers | Files under syndicated

For every article, I try to write something that is interesting, entertaining,
educational and fun. Sometimes I even succeed. Many other times I
have some things I’d like to talk about, but there’s not enough of it
to fill the space.
This time, I decided a disjointed
hodge podge would be the theme. So let’s just have a virtual nerdy talk
about stuff, shall we?


William Rothwell and Nick Garner’s Certified Ethical Hacker Complete Video Course (Pearson IT Certification)

Author: James Gray | Files under syndicated

Watch William Rothwell and Nick Garner’s new Certified Ethical

(CEH) Complete Video Course and learn everything you need to know to ace the
CEH exam in less than 11 hours.


Preseeding Full Disk Encryption

Author: Kyle Rankin | Files under syndicated

Usually I try to write articles that are not aimed at a particular
distribution. Although I may give examples assuming a Debian-based
distribution, whenever possible, I try to make my instructions applicable to
everyone. This is not going to be one of those articles. more>>


Minifree Ltd.’s GNU+Linux Computers

Author: James Gray | Files under syndicated

Minifree Ltd.—doing business as “Ministry of
mainly for reasons Linuxers will like: to make it easier for people to get
computers that respect their freedom and privacy, and to provide funding for
a meaningful project, called Libreboot.


Two Factors Are Better Than One

Author: Kyle Rankin | Files under syndicated

Although I’ve always been interested in security, there are just some security
measures I’ve never liked. more>>


SSH Communications Security’s Universal SSH Key Manager

Author: James Gray | Files under syndicated

Today’s IAM solutions, warns enterprise cybersecurity expert SSH
Communications Security
, fail to address fully the requirements of
trusted access. Organizations lack an efficient way to manage and govern
trusted access credentials and have no visibility into the activities
that occur within the secure channels that are created for trusted access
operations. more>>


Secret Agent Man

Author: Kyle Rankin | Files under syndicated

It used to be that only the paranoid among us focused on strict security
practices, yet these days, it seems like people are stepping up their games
with respect to encryption, password policy and how they
approach their computers in general. Although I always have considered myself more inside
that paranoid camp than outside of it, I even have found myself stepping up
my game lately. more>>