Linux Tutorials on the topic “security”
-
Secure SSH with Google Authenticator Two-Factor Authentication on CentOS 7
Author: Ahmed Qadeer • Tags: linux, centos, security • Comments: 11
SSH access is always critical and you might want to find ways to improve the security of your SSH login. In this article we will see how we can secure SSH with simple two factor authentication by using Google Authenticator. Before using it you have to integrate the SSH daemon on your server with Google Authenticator one time password protocol TOTP and another restriction is that you must have your android phone with you all the time or at least the time you want SSH access. This tutorials is written for CentOS 7.
-
How to install OpenVPN Server and Client on CentOS 7
Author: Muhammad Arul • Tags: centos, linux, security • Comments: 35
OpenVPN is an open source application that allows you to create a private network over the public Internet. OpenVPN tunnels your network connection securely trough the internet. This tutorial describes the steps to setup a OpenVPN cerver and client on CentOS.
-
How to install Arch Linux with Full Disk Encryption
Author: Aaron • Tags: linux, arch linux, desktop, security • Comments: 16
This tutorial explains the installation of Arch Linux + XFCE Desktop with Full Disk Encryption.
-
-
How to encrypt a partition with DM-Crypt LUKS on Linux
Author: Aaron • Tags: linux, security • Comments: 7
TrueCrypt is no more, and the purpose of this post is to show you straightforward partition encryption with dm-crypt luks. DM-Crypt is transparent drive encryption that is kernel module and part of the device mapper framework for mapping physical block device onto higher-level virtual block devices, it uses cryptographic routines from the kernel's crypto api. Long story short, device mapping encryption provided by the kernel "linux" crypto api.
-
Getting started with commandline encryption tools on Linux
Author: Akshay Pai • Tags: linux, debian, ubuntu, centos, opensuse, security • Comments: 2
Encryption is the process of encoding messages or information in such a way that only authorized parties can read them. With almost no privacy in this digital generation of our's, encryption of our data is one of the most required tools. Most of the applications like gmail encrypt our data, but the data on your system is still unsecured and there are hackers or unauthorised users waiting to access them. One way to minimize the risk of data theft is to encrypt the data that is present even on our local system. This tutorial demonstrates several methods of encrypting the data on Linux systems using commandline tools.
-
Installation and Usage Guide for CSF firewall
Author: Akshay Pai • Tags: linux, security • Comments: 2
CSF stands for Configserver security and firewall. CSF is a configuration script built to provide better security to servers , at the same time providing a large number of configuration options and features to configure and secure with extra checks to ensure smooth operation. It helps in locking down public access and to restrict what can be accessed like only e-mails or only websites, etc. To add more power to this, it comes with a Login Failure Daemon (LFD) script that runs all the time to scan for failed attempts to login to the server to detect bruteforce-attacks.
-
Using secure shell (SSH) for login and secure copy (SCP) for data transfer on Linux
Author: Akshay Pai • Tags: centos, debian, linux, mandriva, security, suse, ubuntu • Comments: 4
SSH stands for secure shell. It is an encrypted remote login protocol. Once it has been set up on each node, it can be used to communicate with various other nodes in that network. This tutorial covers public / private key authentication, the installation of public keys on remote servers and secure file transfers with SCP.
-
How to build your own cloud for you and your friends on Debian Wheezy
Author: Roudy Jhausse • Tags: debian, security, email, postfix • Comments: 5
Here's an overview what we will do: Get a Virtual Private Server, a domain name, and set them up, set up postfix and dovecot to send and receive email, prevent SPAM from reaching your INBOX, make sure the emails you send get through spam filters, host calendars, contacts, files with Owncloud and set up webmail and Sync your devices to the cloud.
-
SSH Key Management with privacyIDEA
Author: cornelinux • Tags: ubuntu, security • Comments: 5
In this tutorial I will show, how you can manage your SSH keys for all your servers and different user accounts. This is important, if you have more than one SSH key and it is even more important, if you a responsible for many different users with different SSH keys.
-
Build your own cloud-based two-factor authentication service using WiKID and Packer.
Author: nowen • Tags: centos, security • Comments: 0
WiKID is a dual-sourced two-factor authentication server that uses software tokens (PC/smartphone) to transmit PINs and one-time passwords encrypted with public key encryption. These keys are generated on the device and server and exist only there - unlike most shared-secret based solutions.