Linux Tutorials on the topic “security”
-
Linux Basics: How to hide, lock, encrypt, and secure your files on Linux
Author: Bill Toulas • Tags: desktop, linux, security • Comments: 1
Hiding, locking, or even encrypting your files and folders on Linux is pretty easy, and for whatever reason you want to do this there are many different approaches that you can follow. Here is a quick guide on how to hide, lock, and secure your files in the easiest way possible.
-
Installing a VPN with Tinc on Ubuntu 16.04 LTS
Author: Dan Fries • Tags: linux, security, ubuntu • Comments: 2
Tinc is an open-source VPN daemon that available for a wide range of platforms and has several advantages over similar VPN clients. A Virtual Private Network (VPN) is a secure private network that operates over a larger public network such as the internet. VPNs have become increasingly popular in recent years, largely because they offer increased security and privacy without the need for setting up expensive and complex new hardware.
-
How to Clone an Encrypted Disk Image with Clonezilla
Author: Matt Vas • Tags: centos, linux, security • Comments: 1
In this guide, we’ll discuss how to image or clone the hard drive of a CentOS 7 server used as a DHCP and DNS server in production (DNS and DHCP data don’t change that often on the server). The cloned image will also be encrypted on-fly during the cloning process. A passphrase will be used to encrypt and decrypt the image. In case of losing or forgetting the passphrase, the imaged data will be forever lost.
-
-
Key-Based SSH Logins With PuTTY
Author: Falko Timme • Tags: linux, security • Comments: 73
This guide describes how to generate and use a private/public key pair to log in to a remote system with SSH using PuTTY. PuTTY is an SSH client that is available for Windows and Linux (although it is more common on Windows systems). Using key-based SSH logins, you can disable the normal username/password login procedure which means that only people with a valid private/public key pair can log in. That way, there is no way for brute-force attacks to be successful, so your system is more secure.
-
How to install and use Volatility memory forensic tool
Author: Ahmad • Tags: linux, security, ubuntu • Comments: 1
One of the important parts of Malware analysis is Random Access Memory (RAM) analysis. It helps to identify the running malicious processes, network activities, open connections etc in the compromised system. This article is about the open source security tool "Volatility" for volatile memory analysis. It can be used for both 32/64 bit systems RAM analysis and it supports analysis of Windows, Linux, Mac & Android systems.
-
nginx: How To Block Exploits, SQL Injections, File Injections, Spam, User Agents, Etc.
Author: Falko Timme • Tags: linux, nginx, security, web server • Comments: 9
This short article explains how you can block the most common exploits, SQL injections, file injections, spam and user agents used by hackers and bandwidth hoggers from your nginx vhosts with some simple configuration directives. This configuration is far from being complete, but it's a good starting point. You will have to watch your logs for attempted break-in attempts and then try to modify/complete the ruleset.
-
Nginx with libmodsecurity and OWASP ModSecurity Core Rule Set on Ubuntu 16.04
Author: Dino Edwards • Tags: linux, nginx, security, ubuntu • Comments: 2
In this tutorial, I will show you how to compile the latest version of Nginx with libmodsecurity (Modsecurity 3.x) NOT to be confused with Modsecurity 2.9. We will also be integrating the OWASP ModSecurity Core Rule Set (CRS).
-
How to Set up Nginx High Availability with Pacemaker, Corosync, and Crmsh on Ubuntu 16.04
Author: Muhammad Arul • Tags: high-availability, linux, security, ubuntu • Comments: 9
In this tutorial, I will show you step by step how to create a High Availability Clustered Nginx Web Server with Pacemaker, Corosync, and Crmsh. We will create an Active-Passive Cluster or Failover-cluster Nginx web server on Ubuntu 16.04.
-
How to install pandom: a true random number generator for Linux
Author: Oliver • Tags: centos, debian, fedora, linux, opensuse, security, suse, ubuntu • Comments: 1
This tutorial explains how to install pandom: a timing jitter true random number generator maintained by ncomputers.org. The built-in Linux kernel true random number generator provides low throughput under modern circumstances, as for example: personal computers with solid state drives (SSD) and virtual private servers (VPS). This problem is becoming popular in Linux implementations, because of the continuously increasing need for true random numbers, mainly by diverse cryptographic purposes.
-
Libreswan based Ipsec VPN using preshared and RSA keys on Ubuntu
Author: Ahmad • Tags: linux, security, ubuntu • Comments: 2
The purpose of this tutorial is to explore LibreSwan which provides an IPsec protocol implementation. It is available in RedHat distributions, however, it can be compiled for another platform such as Ubuntu/Debian easily. In this article, the LibreSwan tool is built from source on Ubuntu, then a two peer VPN is configured using preshared & RSA keys between the gateway devices.