This category lists articles about Limawi (tutorials, explanations…).
Limawi provides secure online services.
These services are easy to use. They do not require any particular skills but provide the same functionalities as expert tools. It helps you to protect the confidentiality and the security of your data.
If you look for a service we provide, go through Limawi and you will find it. From everything we do, if you can remember only one name, it is this one:
Limawi, Limawi, Limawi
This name is the designation that gathers our current projects and the ones to come in the cybersecurity area.
Here are our two first services:
An online course a bit wacky about cybersecurity and free, currently only in french.
A security network service, with a monthly subscription.
Obviously, what is it ?
Limawi comes up as several websites and federated apps under the unified domain name https://limawi.io
From this domain name, you can find our cybermarket to subscribe to our services, our Blog and the links to our social networks.
Limawi is available in english and french.
Why Limawi and not MyCrypNet or Kookati directly ?
We wanted a sign that could host our services and contents without providing any functionalities by itself.
By way of, we can manage the lifecycle of our services, to make them evolve, rethink them entirely if needed, even rename them without the user being lost.
The Limawi user knows that only by remembering that name, he/she will find these services and contents in cybersecurity whatever their own names are.
If we had used the name MyCrypNet (that actually has a network connotation, the « Net ») we would have to rebuild a brand image for Kookati without a link being easily identifiable by th reader or user.
By using Limawi, we can host MyCrypNet, Kookati and other services under the same sign. The user will find them.
Why MyCrypNet and Kookati on top of Limawi ?
MyCrypNet and Kookati do not necesseraly touch the same people.
If we use Limawi only, we may have the risk to see some readers/users frustrated to have to sort between one and the other if they are not interested by both of them.
Some users can be only interested by the MyCrypNet functionalities and do not wish to be polluted by the Kookati clowneries.
Other, on the contrary, are interested by the spread knowledge and the wacky story of Kookati and do not have the will to read contents on a paid service they do not want to subscribe to.
A turkish researcher found a flaw allowing the access to root account without password on MacOS High Sierra.
This flaw is critical because easily executable. It can be used locally or remotely if the device has an active VNC protocol (screen sharing activated). This flaw grants access to all device’s permissions. The attacker can do whatever he wants.
The access to the authentication panel to tape the administrator password is the only thing needed. This panel is available from any account on the device (locally or remotely via VNC protocol).
The flaw comes from the mistakenly activated root account on MacOS High Sierra. This root account is an inheritance of the UNIX system from which MacOS is developed. It is present and used in the Linux world but normally is deactivated (available but deactivated) on Mac, replaced with administrator accounts that cannot access system files.
How to protect yourself
You just need to set a password for this root account. Never loose this password.