Linux Tutorials on the topic “security”

  • How to add two-factor authentication to Google Apps for your Domain using open source software

    Author: nowenTags: , , , Comments: 2

    How to add two-factor authentication to Google Apps for your Domain using open source software Everybody loves GMail. With Google Apps for you Domain, you can use GMail with your own domain, allowing organizations to outsource their email - and the requisite anti-spam filtering to Google. Webmail is very convenient, but for frequent travellers and those who use public wifi, it can be quite dangerous. Logging in from a kiosk or shared computer is a sure way to get your username and password stolen by a keystroke logger. Using a public WiFi system can lead to a man-in-the-middle attack. In this document we will take advantage of two open source projects to add two-factor authentication to Google Apps. The first is Gheimdall, a a TurboGears project for Google Apps SSO service. Gheimdall supports PAM and LDAP authentication natively. It also includes sample code to add new authentication methods, which made it very easy to add two-factor authentication from WiKID. WiKID is a dual-source two-factor authentication solution that uses public key cryptography to strongly authenticate users.

  • How To Set Up SSH With Public-Key Authentication On Debian Etch

    Author: DaneeyTags: , Comments: 8

    How To Set Up SSH With Public-Key Authentication On Debian Etch This mini-howto explains how to set up an SSH server on Debian Etch with public-key authorization (and optionally with disabled password logins). SSH is a great tool to control Linux-based computers remotely. It's safe and secure.

  • How to Secure VSFTP with SSL and Two-factor Authentication

    Author: nowenTags: , Comments: 0

    How to Secure VSFTP with SSL and Two-factor AuthenticationRecently, there was a report from Finjan that administrator credentials for over 9,000 FTP servers were for sale. Then, F-Secure noted an increase in FTP-based attacks. Many companies and organization still use FTP extensively. If you're running an FTP server and you think you're admin credentials might be one of those 9,000, you should consider implementing two-factor authentication for SSH, which will then also give you two-factor authentication for SCP. This document shows how to configure the popular and secure VSFTP to use SSL for encryption and WiKID for two-factor authentication for your FTP users.

  • Virus Protection With avast! Linux Home Edition On Ubuntu Gutsy Gibbon

    Author: Falko TimmeTags: , , Comments: 13

    Virus Protection With avast! Linux Home Edition On Ubuntu Gutsy Gibbon This tutorial shows how you can install and use avast! Linux Home Edition on an Ubuntu Gutsy Gibbon desktop. Although there aren't many Linux viruses out there, this can be useful if you often exchange files with Windows users - it can help you to not pass on any Windows viruses (that don't do any harm to Linux systems) to Windows users. avast! Linux Home Edition is free for private and non-commercial use.

  • Chrooting Apache2 With mod_chroot On Debian Etch

    android Author: Falko TimmeTags: , , Comments: 5

    Chrooting Apache2 With mod_chroot On Debian Etch This guide explains how to set up mod_chroot with Apache2 on a Debian Etch system. With mod_chroot, you can run Apache2 in a secure chroot environment and make your server less vulnerable to break-in attempts that try to exploit vulnerabilities in Apache2 or your installed web applications.

  • How To Check If Your Server Is Infected With The Linux/Rst-B Backdoor (Debian Etch)

    Author: Falko TimmeTags: , Comments: 2

    How To Check If Your Server Is Infected With The Linux/Rst-B Backdoor (Debian Etch) Linux Rst-B is a backdoor that can be used to add your server to botnets (see http://www.heise.de/newsticker/meldung/103563 (in German)). This short guide explains how you can install and use the Sophos Linux/RST-B detection tool to check your Debian Etch server and find out if it is infected with Linux Rst-B.

  • Meet the Anti-Nmap: PSAD (EnGarde Secure Linux)

    Author: secureguardianTags: Comments: 0

    Meet the Anti-Nmap: PSAD (EnGarde Secure Linux) Having a great defense involves proper detection and recognition of an attack. In our security world we have great IDS tools to properly recognize when we are being attacked as well as firewalls to prevent such attacks from happening. However, certain attacks are not blindly thrown at you - a good attacker knows that a certain amount of reconnaissance and knowledge about your defenses greatly increases the chances of a successful attack. How would you know if someone is scanning your defenses? Is there any way to properly respond to such scans? You bet there is...

  • Intrusion Detection: Snort (IDS), OSSEC (HbIDS) And Prelude (HIDS) On Ubuntu Gutsy Gibbon

    Author: MiguelTags: , , Comments: 4

    Intrusion Detection: Snort (IDS), OSSEC (HbIDS) And Prelude (HIDS) On Ubuntu Gutsy Gibbon Everybody knows the problem, you have a IDS tool(s) installed and every tool has his own interface. Prelude will allow to log all of the events to the prelude database and be consulted using one interface (prewikka). This howto will describe how to install and configure the different tools that will make up the complete solution.

  • How to install the WiKID Strong Authentication Server - Community Edition

    Author: nowenTags: Comments: 0

    How to install the WiKID Strong Authentication Server - Community Edition The WiKID Strong Authentication Server is a dual-source two-factor authentication system. PINs are encrypted on a software token and sent to the WiKID server. If the PIN is correct, the encryption valid and the account active, a one-time password is generated, encrypted and returned to the user's token where it is decrypted and presented for use with a network-based services. While there are a number of tutorials on how to combine WiKID's two-factor system a variety of systems (such as SSH, OpenVPN, Apache and SSL-VPNs), this is the first to address how to install the WiKID Server.

  • Intrusion Detection: Snort, Base, MySQL, and Apache2 On Ubuntu 7.10 (Gutsy Gibbon) (Updated)

    Author: volksmanTags: , , , , Comments: 9

    Intrusion Detection: Snort, Base, MySQL, and Apache2 On Ubuntu 7.10 (Gutsy Gibbon) (Updated) In this tutorial I will describe how to install and configure Snort (an intrusion detection system (IDS)) from source, BASE (Basic Analysis and Security Engine), MySQL, and Apache2 on Ubuntu 7.10 (Gutsy Gibbon). Snort will assist you in monitoring your network and alert you about possible threats. Snort will output its log files to a MySQL database which BASE will use to display a graphical interface in a web browser.