Linux Tutorials on the topic “security”

  • How to Encrypt Directories/Partitions with eCryptfs on Debian 8 (Jessie)

    debian Author: falkoTags: , , Comments: 1Published: Nov 17, 2015

    eCryptfs is a POSIX-compliant enterprise-class stacked cryptographic filesystem for Linux. You can use it to encrypt partitions and also directories that don't use a partition of their own, no matter the underlying filesystem, partition type, etc. This tutorial shows how to use eCryptfs to encrypt a directory on Debian Jessie.

    read more... | add comment | view as pdf | print

  • How to safely wipe your data with Dariks Boot and Nuke bootable live CD

    linux Author: Bill ToulasTags: , Comments: 3Published: Nov 16, 2015

    Sometimes, we need to completely and irreversibly wipe all data contained in a disk to keep them from falling into the wrong hands. This may not be something we are doing on a day to day basis, but if you want to do it, you should do it right and ensure that the data cannot be recovered by experts. One of the many ways of doing this is through Darik's Boot and Nuke bootable live CD. This tool is made from the same team that develops the professional-grade Blancco data eraser, only it is available for free and without guarantee or support. The reason I like DBaN is because it is very simple to use and does the job fast.

    read more... | add comment | view as pdf | print

  • Encrypt your data with EncFS on Ubuntu 15.10

    ubuntu Author: falkoTags: , Comments: 0Published: Nov 10, 2015

    EncFS provides an encrypted filesystem in user-space. It runs without any special permissions and uses the FUSE library and Linux kernel module to provide the filesystem interface. It is a pass-through filesystem, not an encrypted block device, which means it is created on top of an existing filesystem. This tutorial shows how you can use EncFS on Ubuntu 15.10 (Wiley Werewolf) to encrypt your data.

    read more... | add comment | view as pdf | print

  • How to Install and Configure CSF (Config Server Firewall) on CentOS 7

    centos Author: Muhammad ArulTags: , Comments: 0Published: Oct 16, 2015

    Config Server Firewall / CSF is firewall application suite for Linux servers. CSF is also a Login/Intrusion Detection for applications like SSH, SMTP, IMAP, Pop3, the "su" command and many more. This tutorial will show the installation of CSF on CentOS 7 and guide you trough the first steps to use this powerful application suite.

    read more... | add comment | view as pdf | print

  • How to do image steganography on Linux

    linux Author: Bill ToulasTags: , , , , , Comments: 0Published: Oct 05, 2015

    Steganography is the ancient art of the information concealment. People have found numerous methods to achieve this such as “invisible” inks, messages hidden in objects, and the famous “null cipher”. The word “steganography” comes from the Greek words “steganos” and “graphy” which means “impenetrable writing”. The years have passed and steganography has evolved into a sophisticated part of cryptography.

    read more... | add comment | view as pdf | print

  • How to manage your passwords with Enpass on Linux

    linux Author: Bill ToulasTags: , Comments: 1Published: Sep 30, 2015

    Enpass is an advanced password manager that works natively on Linux. Although its open source nature is limited in the use of a free software encryption engine called SQLCipher, the tool offers good integration with widely used online services and can serve as a central platform where a lot of different passwords, accounts, and other miscellaneous information can be added. That said, it can be useful to many Linux users out there so here's a quick guide on how to set it up.

    read more... | add comment | view as pdf | print

  • Getting Started with UFW (Uncomplicated Firewall) on Ubuntu 15.04

    ubuntu Author: Muhammad ArulTags: , , Comments: 0Published: Sep 21, 2015

    UFW or Uncomplicated Firewall is an application to manage an iptables based firewall on Ubuntu. UFW is the default firewall configuration tool for Ubuntu Linux and provides a user-friendly way to configure the firewall, the UFW command is just like English language so the commands are easy to remember. The UFW firewall supports IPv4 and IPv6.

    read more... | add comment | view as pdf | print

  • Server monitoring with Munin and Monit on CentOS 7

    centos Author: Till BrehmTags: , , Comments: 0Published: Sep 09, 2015

    In this article, I will describe how you can monitor your CentOS 7 server with Munin and Monit. Munin produces nifty little graphics about nearly every aspect of your server (load average, memory usage, CPU usage, MySQL throughput, eth0 traffic, etc.) without much configuration, whereas Monit checks the availability of services like Apache, MySQL, Postfix and takes the appropriate action such as a restart if it finds a service is not behaving as expected. The combination of the two gives you full monitoring: graphics that lets you recognize current or upcoming problems (like "We need a bigger server soon, our load average is increasing rapidly."), and a watchdog that ensures the availability of the monitored services.

    read more... | add comment | view as pdf | print

  • How to install a wireless hotspot with captive page on Linux using CoovaChilli

    fedora Author: Joseph ZikusookaTags: , , , , Comments: 4Published: Aug 31, 2015

    The purpose of this article is to demonstrate how you can turn a Linux based computer or laptop into a wireless hotspot where users can be authenticated via a captive portal page. For this task, the primary controller software will be CoovaChilli. This software is an ideal hotspot management solution for hotels, restaurants, supermarkets, parks, and any place offering WiFi Internet.

    read more... | add comment | view as pdf | print

  • How to use the NMAP Security Scanner on Linux

    linux Author: Bill ToulasTags: , , Comments: 0Published: Aug 17, 2015

    Nmap is a free and open source network discovery and security auditing utility that is widely used in the Linux users community as it is simple to use yet very powerful. Nmap works by sending data packets on a specific target (by IP) and by interpreting the incoming packets to determine what posts are open/closed, what services are running on the scanned system, whether firewalls or filters are set up and enabled, and finally what operation system is running.

    read more... | add comment | view as pdf | print