Security

Want to support HowtoForge? Become a subscriber!
 

How To Set Up Shorewall (Shoreline) 4.0 Firewall On CentOS 5.1

How To Set Up Shorewall (Shoreline) 4.0 Firewall On CentOS 5.1

This tutorial will walk you through setting up Shorewall (Shoreline) 4.0 firewall on CentOS 5.1 , this can easily be adapted to any other Linux distribution out there.

The Bash Script To Configure The Firewall Using IPTABLES

About the Script:

This script is about to build a firewall in Linux OS by using iptables, the user only needs to follow and answer the simple and easy steps and the script will generate the user specified iptables rule in its original form.

I HAVE TESTED THE SCRIPT ON PCLINUXOS, FEDORA-9, DREAM_LINUX, UBUNTU-8.

This is my iptables Version 1.0 (USMAN AKRAM - Lucky)

How To Secure Postgresql Using Two-Factor Authentication From WiKID

How To Secure Postgresql Using Two-Factor Authentication From WiKID

Databases are the key repository for critical data.  If you are storing information that needs to be kept secure from prying eyes, especially credit card or personally identifiable information (PII) you might be required to control access using two-factor authentication.  This tutorial demonstrates how to secure Postgresql with two-factor authentication from WiKID.

Intrusion Detection For PHP Applications With PHPIDS

Intrusion Detection For PHP Applications With PHPIDS

This tutorial explains how to set up PHPIDS on a web server with Apache2 and PHP5. PHPIDS (PHP-Intrusion Detection System) is a simple to use, well structured, fast and state-of-the-art security layer for your PHP based web application. The IDS neither strips, sanitizes nor filters any malicious input, it simply recognizes when an attacker tries to break your site and reacts in exactly the way you want it to. Based on a set of approved and heavily tested filter rules any attack is given a numerical impact rating which makes it easy to decide what kind of action should follow the hacking attempt. This could range from simple logging to sending out an emergency mail to the development team, displaying a warning message for the attacker or even ending the user’s session.

How To Add WiKID Two-Factor Authentication To The Astaro Security Gateway

How To Add WiKID Two-Factor Authentication To The Astaro Security Gateway

Astaro is a very popular Linux-based "all-in-one" security appliance offering spam filtering, malware protection, firewall, VPN, etc. The WiKID Strong Authentication Server is a dual-source two-factor authentication system. PINs are encrypted on a software token and sent to the WiKID server. If the PIN is correct, the encryption valid and the account active, a one-time password is generated, encrypted and returned to the user's token where it is decrypted and presented for use with a network-based services. This document will show how to add WiKID two-factor authentication to the Astaro Security Gateway version 7 using Radius.

Protect Your Files With TrueCrypt 5.1a On Debian Etch (GNOME)

Protect Your Files With TrueCrypt 5.1a On Debian Etch (GNOME)

This document describes how to set up TrueCrypt 5.1a on Debian Etch (GNOME). Taken from the TrueCrypt page: "TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc)."

first page
previous page
...
22
...
next page
last page
XML feed
"Facebook" is a registered trademark of Facebook, Inc. All rights reserved.