Linux Tutorials on the topic “security”

  • Preventing Brute Force Attacks With Fail2ban On Debian Etch

    Author: Falko TimmeTags: , Comments: 17

    Preventing Brute Force Attacks With Fail2ban On Debian Etch In this article I will show how to install and configure fail2ban on a Debian Etch system. Fail2ban is a tool that observes login attempts to various services, e.g. SSH, FTP, SMTP, Apache, etc., and if it finds failed login attempts again and again from the same IP address or host, fail2ban stops further login attempts from that IP address/host by blocking it with an iptables firewall rule.

  • Intrusion Detection With BASE And Snort

    Author: edgeTags: , Comments: 18

    Intrusion Detection With BASE And Snort This tutorial shows how to install and configure BASE (Basic Analysis and Security Engine) and the Snort intrusion detection system (IDS) on a Debian Sarge system. BASE provides a web front-end to query and analyze the alerts coming from a Snort IDS system. With BASE you can perform analysis of intrusions that Snort has detected on your network.

  • How do I scan my Linux system for rootkits, worms, trojans, etc.?

    linux Author: Falko TimmeTags: , , Comments: 3

    Either with chkrootkit or with rkhunter. chkrootkit Either install the package that comes with your distribution (on Debian you would run apt-get install chkrootkit ), or download the sources from www.chkrootkit.org and install manually: wget --passive-ftp ftp://ftp.pangeia.com.br/pub/seg/pac/chkrootkit.tar.gz tar xvfz chkrootkit.tar.gz cd chkrootkit-<version>/ make sense Afterwards, you can move the chkrootkit directory somewhere else, e.g. /usr/local/chkrootkit:

  • Secure and Private Browsing with Squid

    Author: joeTags: Comments: 12

    Version 1.0 Author: Joe Topjian <joe [at] adminspotting [dot] net> Last edited 05/02/2005 Browsing a site that supports SSL is a definite way to make sure no one can snoop in on what you're doing -- which is a good thing when you're doing something personal like checking email over the web or buying something from amazon. But if you're just doing stuff like reading the daily news or checking movie times, is privacy that important? The ultra-paranoid will give a resounding "yes" to that question while most people will just shrug. I find myself in between those two parties. At home while I'm reading the news, I could care less if the traffic is encrypted or not. However, when I'm at a public wi-fi spot, it does bother me a bit.

  • Chrooted SSH HowTo

    VMWare Image Download Author: Falko TimmeTags: Comments: 17

    Chrooted SSH HowTo This tutorial describes how to install and configure OpenSSH so that it will allow chrooted sessions for users. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of.

  • Preventing SSH Dictionary Attacks With DenyHosts

    Author: Falko TimmeTags: Comments: 43

    Preventing SSH Dictionary Attacks With DenyHosts In this HowTo I will show how to install and configure DenyHosts. DenyHosts is a tool that observes login attempts to SSH, and if it finds failed login attempts again and again from the same IP address, DenyHosts blocks further login attempts from that IP address by putting it into /etc/hosts.deny. DenyHosts can be run by cron or as a daemon. In this tutorial I will run DenyHosts as a daemon.

  • Securing the CentOS Server with Bastille and PSAD

    centos Author: treedTags: , Comments: 1

    Securing the CentOS Perfect Setup with Bastille. This article shows how to secure a CentOS server using psad, Bastille, and some other tweaks. psad is a tool that helps detect port scans and other suspicious traffic, and the Bastille hardening program locks down an operating system, proactively configuring the system for increased security and decreasing its susceptibility to compromise.