today's howtos
-
SAV: Why Is Source Address Validation Still a Problem?
Network operators can implement filtering anywhere within their network. However, best current practices (BCPs) recommend they perform it close to the edge of the network. To this end, most equipment vendors support ingress filtering in some form and MANRS provides an extensive guide for network operators to implement SAV in their network. This includes:
Outbound SAV (oSAV) — filtering applied at the network edge to traffic coming from inside the customer network to the outside.
Inbound SAV (iSAV) — filtering applied at the network edge to traffic coming from the outside to the customer network.
Network operators must implement both of these best practices to mitigate IP spoofing attacks.
-
Don’t Override Screen Reader Pronunciation
If you have documented cases where there is a problem for users, you are almost certainly better off changing wording to avoid or clarify pronunciations (sometimes replacing extended characters). If re-writing will not satisfy your audience (or boss), then be certain to test your approach with those same users to see if it genuinely improves their experience.
-
Learn To Use Man Pages Efficiently In Linux
Today, we are going to learn some simple tips and tricks to read man pages effectively in Linux. As you might already know, a man page is divided into several parts, each with a distinct heading. You might have to scroll down for quite a long time when you're looking for a particular information on the specific flag/option. It is really inefficient and time consuming task. This is why it is important to learn to use Linux man pages efficiently to find out what exactly you want to know.
-
Force Linux User to Change Password at Next Login
Due to security concerns, you may want to force the user to change the password on the next login.