Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 4 years ago.
Improve this question
I'm having some troubles with people getting in my folder. Is there any way to have a program that whenever I try to open a specific folder it asks for a password and won't let you see what's in that folder unless you have the password?
The easiest way would be to take advantage of the account system on your computer. Just make an account and password protect it. It will be like you have the whole computer to yourself. If you are unable to make an account of your own for some reason (I don't know the circumstances) i guess you could just throw everything in the folder into a 7zip. No one can get into one of those without a password.
Related
Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 4 days ago.
Improve this question
I want to track my database in microsoft access. For instance, let us assume I have a database named DailyData, this database changes every day, I would like to track it, move it to Pre-Archive and imported a database Archive then I would like to compare the Pre-Archive database and Archive. Plus, I would like to use log in microsoft access. The process should keep going automatically.
Closed. This question is opinion-based. It is not currently accepting answers.
Want to improve this question? Update the question so it can be answered with facts and citations by editing this post.
Closed 2 years ago.
Improve this question
The title basically says it all, what's a good practice for storing passwords that are needed by a cronjob?
For example if you want to run a cron periodically ssh'ing into another machine, you don't just put the user and password plain in the bash script, do you?
ssh is of course a bad example because you could use a keypair, but maybe you get where I'm trying to get at. Store the password in a file encrypted with openssl? But when you look at the script that encrypts the file, you clearly have all information to just decrypt it.
I have wondered this for quite a while now, and never could I come up with an answer, any ideas appreciated.
Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 7 years ago.
Improve this question
I am planning to make a small blog website which can be accessed from our state only.Is there any way to reach this goal.Please help me out.
You cannot do that - simple as that.
You can try a few things to raise a bar, but a determined attacker will be able to overcome the restriction.
Depending on your definition of state you can try a simple firewall. It can be easy if it's a range of IP addresses. But it may be easy to overcome this as well with VPN
You can add authentication and only allow users that can pass authentication. You need to have a process to grant login details only to specific users
Closed. This question is off-topic. It is not currently accepting answers.
Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 10 years ago.
Improve this question
I'm about to hand out my root server password to a company for them to fix an issue that I have with mydns.
I'm sure they are all above board (and I will change the root password after they have finished) but I just want to be sure.
I know (well I think) I can login after them and execute history to see what they did, but I know if they are dishonest, they can just clear the history. I'm worried in case a rogue employee does something malicious or installs keylogging software (which has happened when my mate let another company manage his VPS).
So is there anything I can do? Does the history command backup somewhere? Can I install a keylogger to verify the commands they execute are not malicious?
Any ideas welcome. Ideally I appreciate I shouldn't give out my root password if I don't trust them. But I am in a very difficult situation and have no choice.
Since you are giving them root access, there is nothing you can do from within the machine that they could not subvert with a rootkit.
Your only way to be sure would be to mount the filesystem in another machine and compare the changes made to the files by comparing with a previously made snapshot/backup.
Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 5 years ago.
Improve this question
I would like to know how I can have VoIP on a godaddy Linux server.
I want to be able to pc-pc talk to another computer from mine.
Yet I dont want to pay for anything.
I can try and learn how to script if you put me in the right direction.
But I would like to know how i can do this. Do I use a VoIP engine or just an application that i can install on my server ?
You might want to try and install Asterisk on this server.