Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Sunday, July 30, 2023

how to setup password for an AWS EC2 running instance

The AWS EC2 Linux instance uses a .pem private key file to authenticate the default ubuntu user account.

Let us learn about how to set up a password on your running EC2 instance,

Prerequisites

  • You have ec2 instance running
  • You have root access to ec2 instance

Step 1

Connect to your Linux ec2 instance via putty (/ssh).

Step 2

Login to your running instance

Step 3

Execute below command:

sudo passwd ec2-user

And write the password

Step 4

Now it’s time to go to the directory

/etc/ssh

and follow below command

sudo vim sshd_config 

Step 5

After you apply the command, 

Press “i” and

Now go to the “passwordauthentication” and write “yes”

After change, it please save it

Perfect

Step 6

Last command is

sudo service sshd restart

and disconnect and login again using username and password 

Thursday, February 2, 2023

Netflix strategy on preventing password sharing

Netflix has decided to end the practice of password sharing. Previously, they had encouraged sharing passwords with friends and family, but now they require users to confirm that they live in the same household or purchase their own subscription.

To confirm that someone outside the household is using the account, the primary account holder will need to verify their device using a 4-digit code. The device will have access for seven days before requiring another verification. 

Netflix considers a household as a location where the account owner and others sharing the account live. They will use IP addresses, device IDs, and account activity to confirm if the user belongs to the household. If the account holder is traveling or connected to the home WiFi, they won't need to verify their device, but they need to connect to the home WiFi once every 31 days. 

However, if someone outside the household is using the account, they will be asked to verify and failure to do so may result in being blocked. Currently, Netflix won't charge for sharing an account, but this could change in the future.

Thursday, September 1, 2022

Sunday, May 15, 2022

Difference between Authentication & Authorization

Authentification can be defined as the verification of a claim of identity by a user, a process, or a device, often as a prerequisite to granting it access to resources within a system.  This can be done once or many times during a particular session, workday or other period of activity consisting of multiple steps & tasks.

Authorization is the real-time decision that a system-issued identity claiming to have access rights to that system can be verified to be a (a) System-issued valid identity which is (b) being used or presented by the subject it has been issued to.

Simply put, authentication is the process of verifying who someone is, whereas authorization is the process of verifying what specific applications, files & data a user has access to.

courtesy: http://medium.com





Thursday, May 5, 2022

Difference Between a Data Leak and a Data Breach

 A data breach is the outcome of a planned cyber attack, but a data leak is the accidental exposure of sensitive data by a business. Cybercriminals do not create data leaks, they discover them and then use them to launch data breach attacks. 

Data leaks tend to result from poor security practices. A business can also be impacted if any of its vendors have a data leak. Because these vulnerabilities occur throughout a vast attack landscape they’re difficult to detect and remediate before it’s too late. 

Without a sophisticated data protection solution, businesses will remain vulnerable to data breaches through their third-party network.

Courtesy - www.upgaurd.com 

Featured

TechBytes on Linux

This is a growing list of Linux commands which might come handy for the of Linux users. 1. Found out i had to set the date like this: ...

Popular Posts