Friday, 3 November 2023

Can a 70-hour work week increase your productivity?

 Working long hours is a new question now a days to enhance productivity is a hot topic in a world dominated by hustle culture. While some claim that working 70-hour weeks will result in higher successes, it is critical to consider the costs and advantages.

🔍 Manufacturing v. Heat:
Extra hours cause burnout and decrease quality and creativity. It’s important to find a balance between performance and well-being.

⏰ Time Management:
Efficiency, now not the quantity of hours, need to be our consciousness. Implement time management strategies, delegate obligations, and set clear goals.

💪 The balance:
While commitment is important, it is equally important to prioritize self-care. Choose quality over quantity, and you’ll find that a balanced work-life balance can lead to consistent productivity.

#Productivity #WorkLifeBalance #HustleCulture

Friday, 1 September 2023

Compile OpenSSH 9

Install 

yum install rpm-build zlib-devel openssl-devel pam-devel libselinux-devel gcc perl-devel libXt-devel gtk2-devel make -y

wget -c https://cdn.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-9.3p2.tar.gz

./configure --with-pam --with-selinux --with-privsep-path=/var/lib/sshd/ --sysconfdir=/home/saz163user/ssh

./configure

make
make install

Sunday, 23 July 2023

Use the CIA triad to protect organizations

The CIA triangle is a concept that can assist organisations think about risk while developing systems and security policies. It consists of three components that cybersecurity analysts and organisations strive to maintain: confidentiality, integrity, and availability. Maintaining an acceptable level of risk and ensuring that systems and policies are developed with these factors in mind aids in the establishment of a successful security posture, which refers to an organization's ability to manage its defence of key assets and data as well as respond to change. 

Confidentiality

The concept of confidentiality states that only people with permission can access particular resources or data. The application of design principles, such as the concept of least privilege, can improve secrecy inside an organisation. The least privilege principle restricts users' access to only the data they need to finish tasks relevant to their jobs. One technique to keep private data secure and secret is by limiting access. 

Integrity

Integrity refers to the notion that the data is authentic, verifiably correct, and trustworthy. It is crucial to have protocols in place to check the validity of data. Cryptography, which is used to modify data so that unauthorised parties cannot read it or tamper with it, is one method of confirming data integrity (NIST, 2022). The process of transforming data from a readable format to an encoded format, known as encryption, is another illustration of how a company could implement integrity. Data, such as messages on a company's internal chat platform, can be protected by encryption to prohibit access and ensure that it cannot be altered.  

Availability

The concept of availability states that users who have permission to view the data can do so. Data can be used when necessary when a system abides by the availability and confidentiality criteria. In the workplace, this can imply that the company permits distant workers to access its internal network and carry out their duties. It's important to note that, based on the level of access that employees require in order to do their duties, access to data on the internal network is still restricted. For instance, a worker in the accounting division of the company might require access to corporate funds but not to information on ongoing development initiatives. 

Sunday, 25 June 2023

Importance of 2 factor authentication

Two-factor authentication (2FA) is an additional layer of security for online accounts and systems. It improves password security and considerably minimises the danger of unauthorised access to sensitive information. Here are some of the most important reasons why 2FA is crucial:

Account Security is Increased: 2FA adds an extra step to the authentication process, forcing users to submit two pieces of identification in order to access their accounts. This usually consists of something the user knows (e.g., a password) and something the user has (e.g., a unique code issued to their mobile device). Even if an attacker obtains or guesses a password, they still need the second factor to get access.

Password Vulnerabilities Mitigation: Passwords are frequently the weakest link in security as they are easily forgotten, stolen, or cracked. Even if a password is compromised, an attacker would still require the second factor, such as a physical device or biometric identity, to get unauthorised access with 2FA.

Phishing Protection: Phishing attacks include deceiving users into disclosing their login credentials on fake websites or through false emails. Even if a user unintentionally submits their password on a phishing site, the attacker will still be missing the second authentication factor, preventing them from accessing the account.

Protecting Personal and Financial Data: Many internet accounts contain sensitive information, such as personal information, financial information, and secret documents. Enabling 2FA adds another layer of security, making it far more difficult for unauthorised users to access and misuse such data.

Compliance with Regulatory Requirements: There are legal and regulatory requirements for data security and protection in specific businesses, such as finance, healthcare, and government. By ensuring better authentication methods are in place, 2FA can assist in meeting these commitments.

Users' Peace of Mind: By enabling 2FA, users can have more trust in the security of their accounts. It gives them confidence that their information is more safeguarded and lowers the danger of identity theft, unauthorised access, and financial loss.

Overall, two-factor authentication (FFA) is an important security solution that significantly strengthens the safety of online accounts, improves user privacy, and mitigates the risks associated with password weaknesses and unauthorised access attempts. It is strongly advised to enable 2FA whenever possible to enhance security and peace of mind.


Tuesday, 9 May 2023

Kerberos Authentication Protocol

 

Kerberos Authentication Protocols is a network authentication protocol that provides secure communication over an insecure network by using secret-key cryptography. It was originally developed at MIT and is now widely used in many different organizations, including Microsoft Windows.

Kerberos authentication works by using a third-party authentication server to verify the identities of users and services. When a user requests access to a resource, such as a file server, the user's computer sends a request to the Kerberos authentication server. The authentication server verifies the user's identity and issues a ticket-granting ticket (TGT) that the user can use to request access to other resources on the network.

The user then presents the TGT to a ticket-granting server (TGS), which issues a service ticket for the requested resource. The user presents this service ticket to the resource server, which grants access if the ticket is valid.

Kerberos authentication is widely used in enterprise environments because it provides a high level of security and is scalable to support large networks with many users and resources.

Sunday, 30 April 2023

Extend the BTRFS volume on Azure

To extend a BTRFS volume on Azure, you'll need to follow these steps:

1. Identify the name of the BTRFS volume that you want to extend. You can do this by running the following command:

sudo btrfs filesystem show

This will show you a list of all the BTRFS volumes on your system, along with their names and sizes.

2. Stop any services or applications that are using the BTRFS volume that you want to extend.

3. Use the Azure portal or Azure CLI to extend the size of the Azure disk that the BTRFS volume is on. This will increase the available space on the disk, but not yet on the BTRFS volume itself.

4. Use the following command to resize the BTRFS volume to use the new space:

sudo btrfs filesystem resize max /path/to/mount/point

Replace "/path/to/mount/point" with the actual path to the mount point of the BTRFS volume that you want to extend.

5. Verify that the BTRFS volume has been extended by running the following command:

sudo btrfs filesystem show

This should show that the size of the BTRFS volume has been increased to the same size as the Azure disk.

6. Start any services or applications that were stopped in step 2.

That's it! Your BTRFS volume on Azure should now be extended to use the additional space on the Azure disk.





Monday, 27 March 2023

Decentralized DNS Explanation

 Distributed DNS (Domain Name System) is a system designed to distribute domain name resolution services across a distributed network of computers, rather than relying on a central authority or single point of failure. Traditional DNS systems rely on centralized organizations to manage and maintain records of domain names and their corresponding IP addresses.

In a distributed DNS system, the responsibility for maintaining records is distributed across a network of nodes, with each node maintaining a copy of the entire domain name database. This improves security, resilience, and resistance to censorship as the system is not controlled by a single entity.

Distributed DNS can be achieved using a variety of technologies, including blockchain, peer-to-peer networks, distributed hash tables, and more. These technologies allow users to register and manage domain names in a decentralized manner, ensuring the robustness and security of the system.