I have taken some security measures, but I'm no security expert nor a techie. So I genuinely just want to make sure if those are enough. (i.e I'm not sure if I'm really safe).
That said, you just answered my questions, thank you.
:o Right. Customer might be using webmin.. and I am customer.
Anyway, I'm only opening the webmin port to certain IP. I do have the latest bash, and I put two factor auth on the webmin login.
Should I assume I'm safe from this exploit?
I'm using it, not exactly pretty and usable but I consider it handy to track various thread in several forums.
Useful when you need to do some research/gathering community feedback for certain topic.
That said vpsboard been broken for sometimes in Tapatalk.. a few people said they got it...
Yeah, I've got the notification mail about that hack incident, Buffers said only a minority of users got hacked.
Fortunately, it seems I'm not one of those minority of users.
I appreciate your giving heads-up to other user though. I agree this incident needs to be mentioned.
I think "Buffer" (http://bufferapp.com) is made for such purpose. Most input are to be done on its browser extension, though.
If I recall it correctly it has pretty decent Tweet scheduling feature.
I'm surprised no one mentioned OpenVPN Access Server.
it's basically the enterprise service offered by OpenVPN company. (i.e OpenVPN setup automated and commercialized)
Features:
Automated installation via sh script,
Everything configured through back-end (Admin) Web GUI
OpenVPN client...
Ah.. I haven't lurked on LET until recently. Turns out a lot of things had been happened on LE* :P and it appears most prominent figures including all of the good stuffs (tuts, discussion) have moved here.
Liking this community so far. :)