Linux Tutorials on the topic “security”
-
How to create a jailed ssh user with Jailkit on Debian Wheezy
Author: Srijan Kishore • Tags: debian, linux, security • Comments: 5
How to create a jailed ssh user with Jailkit on Debian Wheezy This document describes how to install and configure Jailkit in Debian Wheezy Server. Jailkit is a set of utilities to limit user accounts to specific files using chroot() and or specific commands. Setting up a chroot shell, a shell limited to some specific command, or a daemon inside a chroot jail is a lot easier and can be automated using these utilities.
-
How to configure the WiKID Strong Authentication 4.0 using the Quick-setup option
Author: nowen • Tags: linux, security • Comments: 1
How to configure the WiKID Strong Authentication 4.0 using the Quick-setup option The 4.0 release of the WiKID Strong Authentication System has two major new features. First it is now free for up to 5 users making it perfect for home users, small businesses or long-term testing. Second, there's a new quick-start configuration system. You create a text file with pertinent information about your network and use it to build a fully-functioning two-factor authentication server. This tutorial will show you how to use this new feature.
-
How to setup Single Sign On with OTP using simpleSAMLphp and privacyIDEA
Author: cornelinux • Tags: linux, php, security, programming, web server • Comments: 3
How to setup Single Sign On with OTP using simpleSAMLphp and privacyIDEA This howto will deal with Single Sign On to web pages. Maybe you know OpenID. Similar to Kerberos a "Ticket" is granted to the user to authenticate at other services using the ticket and not the credentials anymore. In this howto we will use SAML (Security Assertion Markup Language) which is more sophisticated than the simple OpenID. SAML can be used to setup trust relations between several entities. This is why it is used between companies and organizations, why online service are using it.
-
-
Data Recovery Techniques on Linux
Author: mudric • Tags: backup, linux, security • Comments: 3
Data Recovery Techniques on Linux When one of my friends called telling me that he had accidentally deleted some important files from his drive, his exasperation was understandable. It happens to everyone at some point of their computer-using lives. Unfortunately, in his case, those were some extremely important documents that, had he not recovered them, could have proven very costly.
-
Fast way to update Bash on Debian based distributions to secure it against Shell Shock.
Author: SamTzu • Tags: debian, security, ubuntu • Comments: 0
Fast way to update Bash on Debian based distributions to secure it against Shell Shock.
-
Installing and using Tundeep for network tunnelling and testing on Debian
Author: aziods • Tags: debian, security • Comments: 0
Installing and using Tundeep for network tunnelling and testing on Debian Tundeep is a network tunnelling daemon written in C that runs in userspace using libpcap. Tundeep is used as a security testing tool allowing a tester to tunnel through the target network at layer 2. A TAP interface will be brought up on the tester's machine for each level of the network allowing direct interaction with hosts on the network segment through a compromised client device.
-
How to setup your OTP appliance with privacyIDEA
Author: cornelinux • Tags: linux, security • Comments: 4
How to setup your OTP appliance with privacyIDEA In this howto we will setup a system that can act as your own personal OTP appliance, managing all authentication devices in your network. You then may configure your services to authenticate against this machine. It is a good idea to use some virtualization mechanism. If you have some old hardware around, this is even as good.
-
How to create a jailed ssh user with Jailkit on Debian Wheezy
Author: Srijan Kishore • Tags: debian, linux, security • Comments: 1
How to create a jailed ssh user with Jailkit on Debian Wheezy This document describes how to install and configure Jailkit in Debian Wheezy Server. Jailkit is a set of utilities to limit user accounts to specific files using chroot() and or specific commands. Setting up a chroot shell, a shell limited to some specific command, or a daemon inside a chroot jail is a lot easier and can be automated using these utilities.
-
Secure OpenVPN with two-factor authentication from WiKID on Centos 7
Author: nowen • Tags: centos, security • Comments: 1
Secure OpenVPN with two-factor authentication from WiKID. In a previous tutorial, we showed how to configure PAM-RADIUS to support two-factor authentication. Now, and in future tutorials, we will add remote access services to this server that will also use WiKID for two-factor authentication. In this tutorial, we will demonstrate how to leverage that setup to add two-factor authentication through radius to OpenVPN on Centos 7.
-
How to configure pam-radius for WiKID Two-factor Authentication on Centos 7
Author: nowen • Tags: centos, security • Comments: 0
Securing SSH On Centos 7 With WiKID Two-Factor Authentication SSH offers a highly secure channel for remote administration of servers. However, if you face an audit for regulatory or business requirements, such as Visa/Mastercard PCI, you need to be aware of some potential authentication related short-comings that may cause headaches in an audit.