Linux Tutorials on the topic “security”

  • Installation and Usage Guide for CSF firewall

    linux Author: Akshay PaiTags: , Comments: 0Published: Mar 02, 2015

    CSF stands for Configserver security and firewall. CSF is a configuration script built to provide better security to servers , at the same time providing a large number of configuration options and features to configure and secure with extra checks to ensure smooth operation. It helps in locking down public access and to restrict what can be accessed like only e-mails or only websites, etc. To add more power to this, it comes with a Login Failure Daemon (LFD) script that runs all the time to scan for failed attempts to login to the server to detect bruteforce-attacks.

    read more... | add comment | view as pdf | print

  • Using secure shell (SSH) for login and secure copy (SCP) for data transfer on Linux

    linux Author: Akshay PaiTags: , , , , , , Comments: 1Published: Feb 05, 2015

    SSH stands for secure shell. It is an encrypted remote login protocol. Once it has been set up on each node, it can be used to communicate with various other nodes in that network. This tutorial covers public / private key authentication, the installation of public keys on remote servers and secure file transfers with SCP.

    read more... | add comment | view as pdf | print

  • How to build your own cloud for you and your friends on Debian Wheezy

    debian Author: Roudy JhausseTags: , , , Comments: 0Published: Jan 12, 2015

    Here's an overview what we will do: Get a Virtual Private Server, a domain name, and set them up, set up postfix and dovecot to send and receive email, prevent SPAM from reaching your INBOX, make sure the emails you send get through spam filters, host calendars, contacts, files with Owncloud and set up webmail and Sync your devices to the cloud.

    read more... | add comment | view as pdf | print

  • SSH Key Management with privacyIDEA

    ubuntu Author: cornelinuxTags: , Comments: 0Published: Jan 09, 2015

    In this tutorial I will show, how you can manage your SSH keys for all your servers and different user accounts. This is important, if you have more than one SSH key and it is even more important, if you a responsible for many different users with different SSH keys.

    read more... | add comment | view as pdf | print

  • Build your own cloud-based two-factor authentication service using WiKID and Packer.

    centos Author: nowenTags: , Comments: 0Published: Jan 08, 2015

    WiKID is a dual-sourced two-factor authentication server that uses software tokens (PC/smartphone) to transmit PINs and one-time passwords encrypted with public key encryption. These keys are generated on the device and server and exist only there - unlike most shared-secret based solutions.

    read more... | add comment | view as pdf | print

  • How to create a jailed ssh user with Jailkit on Debian Wheezy

    debian Author: srijanTags: , , Comments: 0Published: Dec 18, 2014

    How to create a jailed ssh user with Jailkit on Debian Wheezy This document describes how to install and configure Jailkit in Debian Wheezy Server.  Jailkit is a set of utilities to limit user accounts to specific files using chroot() and or specific commands. Setting up a chroot shell, a shell limited to some specific command, or a daemon inside a chroot jail is a lot easier and can be automated using these utilities.

    read more... | add comment | view as pdf | print

  • How to configure the WiKID Strong Authentication 4.0 using the Quick-setup option

    tux Author: nowenTags: , Comments: 1Published: Dec 03, 2014

    How to configure the WiKID Strong Authentication 4.0 using the Quick-setup option The 4.0 release of the WiKID Strong Authentication System has two major new features. First it is now free for up to 5 users making it perfect for home users, small businesses or long-term testing. Second, there's a new quick-start configuration system. You create a text file with pertinent information about your network and use it to build a fully-functioning two-factor authentication server. This tutorial will show you how to use this new feature.

    read more... | add comment | view as pdf | print

  • How to setup Single Sign On with OTP using simpleSAMLphp and privacyIDEA

    php Author: cornelinuxTags: , , , , Comments: 0Published: Oct 10, 2014

    How to setup Single Sign On with OTP using simpleSAMLphp and privacyIDEA This howto will deal with Single Sign On to web pages. Maybe you know OpenID. Similar to Kerberos a "Ticket" is granted to the user to authenticate at other services using the ticket and not the credentials anymore. In this howto we will use SAML (Security Assertion Markup Language) which is more sophisticated than the simple OpenID. SAML can be used to setup trust relations between several entities. This is why it is used between companies and organizations, why online service are using it.

    read more... | add comment | view as pdf | print

  • Data Recovery Techniques on Linux

    tux Author: mudricTags: , , Comments: 3Published: Oct 08, 2014

    Data Recovery Techniques on Linux When one of my friends called telling me that he had accidentally deleted some important files from his drive, his exasperation was understandable. It happens to everyone at some point of their computer-using lives. Unfortunately, in his case, those were some extremely important documents that, had he not recovered them, could have proven very costly.

    read more... | add comment | view as pdf | print

  • Installing and using Tundeep for network tunnelling and testing on Debian

    debian Author: aziodsTags: , Comments: 0Published: Oct 05, 2014

    Installing and using Tundeep for network tunnelling and testing on Debian Tundeep is a network tunnelling daemon written in C that runs in userspace using libpcap. Tundeep is used as a security testing tool allowing a tester to tunnel through the target network at layer 2. A TAP interface will be brought up on the tester's machine for each level of the network allowing direct interaction with hosts on the network segment through a compromised client device.

    read more... | add comment | view as pdf | print