Why Does Clicking on a Norton Link for Power Eraser Take You to a Bootable Recovery Option?

Problem scenario
You got an error message about needing Norton Power Eraser (and that a common reason for installation failure of Norton is an infected computer). You clicked on the link and got a message about a boot recovery application with an .iso file. What should you do as it does not seem to match?

Ignore the link in the Norton app.

What Do You Do if Norton 360 Does Not Open?

Problem scenario
You double click on Norton 360, and it does not launch. What should you do?

Possible solution #1
Update Norton 360 by downloading it and using the download manager to upgrade your installation.

Possible solution #2
Remove Norton 360 with Norton Remove and Uninstall Tool:
The uninstallation process can take 20 to 25 minutes.

How Can You Find out if an FQDN, IP Address or Email Address are those of a Spammer?

Problem scenario
You are not sure if an email address is associated with spam. Someone make comments on your blog. You are not sure if they are legitimate comments or if it is someone trying to spam a website or create a message that is an advertisement. What should you do to check-in on the email address?

Try https://cleantalk.org/blacklists/

On cleantalk.org you can search for IP addresses,

How Do You Become the Root User when You Forgot the Root Password?

Problem scenario
You cannot use sudo because a relevant .so file has been deleted. You do not know the root password, and you are using Fedora. What should you do?

Change the root password with a bootable DVD or USB drive with the .iso of Fedora. Boot to the DVD or USB drive. Then use these directions.

How Do You Use Partitions on a Disk and Have Complete Disk Encryption with Ubuntu?

Problem scenario
You want your entire hard disk to have encryption. You want to install Ubuntu Linux with partitions. What do you do?

Follow these directions, but make sure the second partition (with GRUB) uses 80 MB. To do this, mentally find this command “sgdisk –new=2:0:+2M $DEV” here:

When you get to that command,

How Do You Get Passwords to Expire for Existing Users?

Problem scenario
You want passwords to rotate periodically for all users. You modified the /etc/login.defs file, and new users are inheriting the temporal rotational policies for passwords. How can pre-existing accounts be forced to periodically change their password?

Use this command for every password (but replace “jdoe” with the user you want to change and replace “30” with the number of days you want the password to last for before the user is forced to change it):

sudo chage -M 30 jdoe

# The user can still log in one more time after expiration. …

How Do You Disable Hyperthreading in Linux?

Problem scenario
You are running Linux with a multi-core CPU and motherboard. You want to turn off simultaneous multithreading (because in some use cases the performance can improve or you are concerned about security). What should you do?

Possible Solution #1
If you want to be able to turn it back on without rebooting, you could have a crontab job run a script at reboot.

Is the Term “Threadjacking” a Netiquette or Cybersecurity Issue?

Problem scenario
You have heard the term “threadjacking” in different contexts. What does it mean?

The word “threadjack” can have different meanings. It can be a netiquette issue, a cybersecurity issue, or both.

Threadjacking can refer to the practice of responding to an email thread or website posting to change the topic. These type of threadjackings have no security implication.

How Do You Troubleshoot the Error “req: Use -help for summary”?

Problem scenario
You run a command like this:

sudo openssl req -newkey rsa:2048 -nodes -keyout contint.key -x509 -days 9999 contint.crt

You get this as the output: “req: Use -help for summary.”

What should you do?

Possible Solution #1
Use the “-out” flag between “9999” and “contint.crt”.

Possible Solution #2
Do you have an extra “-new” flag in your command?