Security

Want to support HowtoForge? Become a subscriber!
 

Securing the CentOS Perfect Setup with Bastille

Securing the CentOS Perfect Setup with Bastille

This article shows how to secure a CentOS server using psad, Bastille, and some other tweaks. psad is a tool that helps detect port scans and other suspicious traffic, and the Bastille hardening program locks down an operating system, proactively configuring the system for increased security and decreasing its susceptibility to compromise.

Security Testing your Apache Configuration with Nikto

Security Testing your Apache Configuration with Nikto 

By now you've got the perfect setup for your new Ubuntu 6.0.6 (Dapper Drake) box. You may have even followed the excellent Intrusion Detection and Prevention with BASE and Snort tutorial. And as an added precaution you installed DenyHosts to prevent hack attempts via ssh. But now that you've got your new LAMP server on the internet, how can you tell that your new web server is secure? You test it, of course!

Postfix Spam Filter using Ubuntu Dapper, MailScanner, SpamAssassin, Razor, Pyzor, DCC and ClamAV

Postfix Spam Filter using Ubuntu Dapper, MailScanner, SpamAssassin, Rayzor, Pyzor, DCC and ClamAV

This is a similar version of the HOWTO that can be found here: http://www200.pair.com/mecham/spam/spamfilter20050628.html. Except for using Ubuntu Server instead of Debian and MailScanner instead of Amavisd, the Postfix, Rayzor, Pyzor, DCC and ClamAV sections are almost the same.

Intrusion Detection With BASE And Snort

Intrusion Detection With BASE And Snort

This tutorial shows how to install and configure BASE (Basic Analysis and Security Engine) and the Snort intrusion detection system (IDS) on a Debian Sarge system. BASE provides a web front-end to query and analyze the alerts coming from a Snort IDS system. With BASE you can perform analysis of intrusions that Snort has detected on your network.

Killing That Spam With Postgrey And Postfix

Killing That Spam With Postgrey And Postfix

Ever heard of stopping spam with greylisting?

This tutorial will show you how to setup greylisting with Postgrey and Postfix on Debian. Greylisting will not replace spam filtering software like SA but it will serve as a powerful first hurdle for spam thus reducing the ammount of spam entering the system at all.

Mandriva 2005 Postfix Anti-Spam, Anti-Virus Relay Server for Exchange Server 2000/2003

Mandriva 2005 Postfix Anti-Spam, Anti-Virus Relay Server for Exchange Server 2000/2003

There are a couple of linux how-tos floating on the Internet that deal with this very subject. As a matter of fact, those guides are what inspired to write this one. In the spirit of keeping it simple, let me recommend the Mandrake or as it’s currently known Mandriva Linux distro. This guide has been written with this distro in mind.

Creating A Safe Directory With PAM And EncFS

Creating A Safe Directory With PAM And EncFS

This HowTo is about creating a user-session-safe directory which offers security on- and offline. This is done with PAM, a module named pam_script and EncFS ("Encrypted Filesystem"). This safe directory is used to store credentials and other sensitive information during a session. When a usersession is ended, in the worst case an encrypted directory remains on the harddrive. In the best case everything is removed. This construction is only meant to store information during a session, not for documents or any other valid information.

How To Automate Spamcop Submissions

How To Automate Spamcop Submissions

Spamcop is a service which provides RBLs for mailservers in order to reject incoming mail from spammers.

Their philosophy is to process possible spam complaints from users. When they receive a certain amount of complaints during a time-period then they will blacklist the offender. This system is dependant on spam reporting from users. However, their submission process is not very user-friendly [...]

How to scan your Linux-Distro for Root Kits

How to scan your Linux-Distro for Root Kits

Do you suspect that you have a compromised system ?

Check now for root kits that the intruder may have installed !!!

So... What in the hell is a root kit ???
A root kit is a collection of programs that intruders often install after they have compromised the root account of a system.
These programs will help the intruders clean up their tracks, as well as provide access back into the system.
Root kits will sometimes leave processes running so that the intruder can come back easily and without the system administrator's knowledge !

How To Test Your Linux-Distro Firewall

How To Test Your Linux-Distro Firewall

Recently, I wrote an article about how to scan your Linux-Distro for Root Kits.

Now that the machine is clean. I think, a good thing to do is to test my Firewall.
The good news is that we can use the free tool FTester.
The bad news is that FTester needs to be configured right...
So... Let's get to work !
first page
previous page
...
38
next page
last page