- Web Server
- Control Panels
- Site Map/RSS Feeds
Mandriva 2005 Postfix Anti-Spam, Anti-Virus Relay Server for Exchange Server 2000/2003
There are a couple of linux how-tos floating on the Internet that deal with this very subject. As a matter of fact, those guides are what inspired to write this one. In the spirit of keeping it simple, let me recommend the Mandrake or as itâ€™s currently known Mandriva Linux distro. This guide has been written with this distro in mind.
Creating A Safe Directory With PAM And EncFS
This HowTo is about creating a user-session-safe directory which offers security on- and offline. This is done with PAM, a module named pam_script and EncFS ("Encrypted Filesystem"). This safe directory is used to store credentials and other sensitive information during a session. When a usersession is ended, in the worst case an encrypted directory remains on the harddrive. In the best case everything is removed. This construction is only meant to store information during a session, not for documents or any other valid information.
How To Automate Spamcop Submissions
Spamcop is a service which provides RBLs for mailservers in order to reject incoming mail from spammers.
Their philosophy is to process possible spam complaints from users. When they receive a certain amount of complaints during a time-period then they will blacklist the offender. This system is dependant on spam reporting from users. However, their submission process is not very user-friendly [...]
How to scan your Linux-Distro for Root Kits
Do you suspect that you have a compromised system ?Check now for root kits that the intruder may have installed !!!
So... What in the hell is a root kit ???
A root kit is a collection of programs that intruders often install after they have compromised the root account of a system.
These programs will help the intruders clean up their tracks, as well as provide access back into the system.
Root kits will sometimes leave processes running so that the intruder can come back easily and without the system administrator's knowledge !
How To Test Your Linux-Distro Firewall
Recently, I wrote an article about how to scan your Linux-Distro for Root Kits.Now that the machine is clean. I think, a good thing to do is to test my Firewall.
The good news is that we can use the free tool FTester.
The bad news is that FTester needs to be configured right...
So... Let's get to work !
Add Mailfiltering to the Falko howto Postfix Guide
In this guide, you will learn how to get around some of the security policies that Postfix affords in favour of quickness and speed.
The Falko guide shows us how to get Virtual users working with Postfix/ Courier IMAP however it would be nice to offer per user mail filtering on email marked as spam by Spam Assasin for example to go into a SPAM folder for example.
DSPAM is a scalable and open-source content-based spam filter designed for multi-user enterprise systems. It's great at filtering out spam but on busy mailservers the pruning of the MySQL databases takes way too long time. This small tutorial/hack can speed up the pruning of old data considerably.
The Perfect Linux Firewall Part II -- IPCop & Copfilter
This document is the second segment in a series on installing IPCop firewall. We will be creating a "DMZ" for hosting your own web server or mail server and the Copfilter proxy for filtering your application layer ingress and egress network traffic. This is intended to be a rough overview on creating a IPCop firewall with Copfilter and comes without warranty of any kind.
Preventing SSH Dictionary Attacks With DenyHosts
In this HowTo I will show how to install and configure DenyHosts. DenyHosts is a tool that observes login attempts to SSH, and if it finds failed login attempts again and again from the same IP address, DenyHosts blocks further login attempts from that IP address by putting it into /etc/hosts.deny. DenyHosts can be run by cron or as a daemon. In this tutorial I will run DenyHosts as a daemon.
Chrooted SSH HowTo
This tutorial describes how to install and configure OpenSSH so that it will allow chrooted sessions for users. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of.