Trojita, the fastest Email Client - Gmail Setup Guide

 I had recently switched to KDE from Gnome and was looking for an Alternative for Geary. I really liked how fast Geary was and neither Thunderbird nor KMail could act as a replacement for my need(Simple and fast). Before giving up for another Electron app, I gave a try to Trojita and immediately fell in love with its speed. It was blazingly fast to the extent even Geary could never match! This is a simple guide to setup Trojita for Gmail.  Sources: OMG Ubuntu Google Support Overview: You need to make use of App Passwords in Google Account in order to access Trojita through Gmail (The other way is to enable Less Secure App Access which doesn't sound inviting!). App Passwords, in turn, need 2-Factor Authentication turned on. After installing Trojita, you need to setup IMAP servers for Gmail. Turn on 2- Step Verification Set up App Passwords Install Trojita Logging in with Gmail 1. Turn on 2-StepVerification Open your Google Account . In the navigation panel, select Security . Un

Be Careful of Shodan - The Creepy Search Engine


If you don’t want your webcams, printers or home security systems to be hacked, be watchful. Recently, the internet has revealed the scariest search engine called Shodan that peeps into the dark corners of the web, finding servers, webcams and more devices connected to the internet. This search engine for hackers collects information on over 500 million devices every month.

Shodan, which stands for Sentient Hyper-Optimized Data Access Network, is the "Google for hackers." It is essentially a search engine for servers, routers, load balances and computers. Shodan's database contains devices identified by scanning the Internet for the ports typically associated with HTTP, FTP, SSH  and Telnet. Hackers are using the Shodan computer search engine to find Internet-facing SCADA systems using potentially insecure mechanisms for authentication, according to warning from ICS-CERT(PDF).

Now that Shodan would bring more potential threat to connected technology, security professionals have begun to seek out vulnerable devices on the search engine and the response group recommends the following:
  • Place all control systems assets behind firewalls, separated from the business network
  • Deploy secure remote access methods such Virtual Private Networks (VPNs) for remote access
  • Remove, disable, or rename any default system accounts ( where possible)
  • Implement account lockout policies to reduce the risk from brute forcing attempts
  • Implement the policies requiring the use of strong passwords
  • Minotor the creation of administrator level accounts by third-party vendors

Comments