Linux Tutorials on the topic “security”

  • How to do image steganography on Linux

    linux Author: Bill ToulasTags: , , , , , Comments: 0Published: Oct 05, 2015

    Steganography is the ancient art of the information concealment. People have found numerous methods to achieve this such as “invisible” inks, messages hidden in objects, and the famous “null cipher”. The word “steganography” comes from the Greek words “steganos” and “graphy” which means “impenetrable writing”. The years have passed and steganography has evolved into a sophisticated part of cryptography.

    read more... | add comment | view as pdf | print

  • How to manage your passwords with Enpass on Linux

    linux Author: Bill ToulasTags: , Comments: 1Published: Sep 30, 2015

    Enpass is an advanced password manager that works natively on Linux. Although its open source nature is limited in the use of a free software encryption engine called SQLCipher, the tool offers good integration with widely used online services and can serve as a central platform where a lot of different passwords, accounts, and other miscellaneous information can be added. That said, it can be useful to many Linux users out there so here's a quick guide on how to set it up.

    read more... | add comment | view as pdf | print

  • Getting Started with UFW (Uncomplicated Firewall) on Ubuntu 15.04

    ubuntu Author: Muhammad ArulTags: , , Comments: 0Published: Sep 21, 2015

    UFW or Uncomplicated Firewall is an application to manage an iptables based firewall on Ubuntu. UFW is the default firewall configuration tool for Ubuntu Linux and provides a user-friendly way to configure the firewall, the UFW command is just like English language so the commands are easy to remember. The UFW firewall supports IPv4 and IPv6.

    read more... | add comment | view as pdf | print

  • Server monitoring with Munin and Monit on CentOS 7

    centos Author: Till BrehmTags: , , Comments: 0Published: Sep 09, 2015

    In this article, I will describe how you can monitor your CentOS 7 server with Munin and Monit. Munin produces nifty little graphics about nearly every aspect of your server (load average, memory usage, CPU usage, MySQL throughput, eth0 traffic, etc.) without much configuration, whereas Monit checks the availability of services like Apache, MySQL, Postfix and takes the appropriate action such as a restart if it finds a service is not behaving as expected. The combination of the two gives you full monitoring: graphics that lets you recognize current or upcoming problems (like "We need a bigger server soon, our load average is increasing rapidly."), and a watchdog that ensures the availability of the monitored services.

    read more... | add comment | view as pdf | print

  • How to install a wireless hotspot with captive page on Linux using CoovaChilli

    fedora Author: Joseph ZikusookaTags: , , , , Comments: 1Published: Aug 31, 2015

    The purpose of this article is to demonstrate how you can turn a Linux based computer or laptop into a wireless hotspot where users can be authenticated via a captive portal page. For this task, the primary controller software will be CoovaChilli. This software is an ideal hotspot management solution for hotels, restaurants, supermarkets, parks, and any place offering WiFi Internet.

    read more... | add comment | view as pdf | print

  • How to use the NMAP Security Scanner on Linux

    linux Author: Bill ToulasTags: , , Comments: 0Published: Aug 17, 2015

    Nmap is a free and open source network discovery and security auditing utility that is widely used in the Linux users community as it is simple to use yet very powerful. Nmap works by sending data packets on a specific target (by IP) and by interpreting the incoming packets to determine what posts are open/closed, what services are running on the scanned system, whether firewalls or filters are set up and enabled, and finally what operation system is running.

    read more... | add comment | view as pdf | print

  • How to install ProFTPd with TLS support on Ubuntu 15.04

    ubuntu VMWare Image Download Author: Till BrehmTags: , , Comments: 4Published: Aug 13, 2015

    FTP is a very insecure protocol because all passwords and all data are transferred in clear text. By using TLS, the whole communication can be encrypted, thus making FTP much more secure. This article explains how to set up ProFTPd with TLS on an Ubuntu 15.04 server, how to add an FTP user and to use FileZilla to connect securely with TLS.

    read more... | add comment | view as pdf | print

  • How to scan for viruses with ClamAV on Ubuntu

    ubuntu Author: Bill ToulasTags: , , , Comments: 5Published: Jul 30, 2015

    There aren't many viruses made for Linux distributions and as such, most people who use such systems don't ever bother using an antivirus software. Those however who do want to be able to scan their system or other windows-based systems that are connected on a Linux PC through a network, they can use ClamAV. ClamAV is an open source anti-virus engine that is built to detect viruses, trojans, malware and other threats. It supports multiple file formats (documents, executables or archives), utilizes multi-thread scanner features and receives updates for its signature database at least 3-4 times a day.

    read more... | add comment | view as pdf | print

  • How to secure your PDF documents with passwords (and how to crack them if needed)

    linux Author: Bill ToulasTags: , , , , , , Comments: 3Published: Jul 13, 2015

    Documents safety is a particularly sensitive matter due to the typical usage nature and possible value and importance of the contents. That said, users should be extra careful when sharing documents that shouldn't be leaked to other parties.

    read more... | add comment | view as pdf | print

  • Two Factor Authentication for ownCloud

    linux Author: cornelinuxTags: , Comments: 1Published: Jun 30, 2015

    This tutorial shows you how to protect ownCloud logins with two factor authentication by using privacyIDEA to manage the second authentication factor. privacyIDEA is a system to manage authentication devices for two factor authentication in your own network - not at any Identity Provider - thus keeping your identity and the identities of your users also under your control.

    read more... | add comment | view as pdf | print