Linux Tutorials on the topic “security”

  • Setting Up An Iptables Firewall On Ubuntu With Firehol

    Author: PhilBieberTags: , Comments: 1

    Setting Up An Iptables Firewall On Ubuntu With Firehol Everybody, who tried to configure an iptables firewall knows, that it can be quite a PITA. firehol is a tool that helps us to configure iptables according to our needs. In this How-To, I will discribe how to set up an iptables firewal using firehol that only allows SSH and ICMP (the protocol responsible for ping and traceroute). Also, only incoming connections are filtered, and outgoing connections are allowed.

  • Protect Your Files With TrueCrypt 5 On Fedora 8

    Author: o.meyerTags: , , Comments: 3

    Protect Your Files With TrueCrypt 5 On Fedora 8 This document describes how to set up TrueCrypt 5 on Fedora 8. Taken from the TrueCrypt page: "TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc)."

  • How to add two-factor authentication to Google Apps for your Domain using open source software

    Author: nowenTags: , , , Comments: 2

    How to add two-factor authentication to Google Apps for your Domain using open source software Everybody loves GMail. With Google Apps for you Domain, you can use GMail with your own domain, allowing organizations to outsource their email - and the requisite anti-spam filtering to Google. Webmail is very convenient, but for frequent travellers and those who use public wifi, it can be quite dangerous. Logging in from a kiosk or shared computer is a sure way to get your username and password stolen by a keystroke logger. Using a public WiFi system can lead to a man-in-the-middle attack. In this document we will take advantage of two open source projects to add two-factor authentication to Google Apps. The first is Gheimdall, a a TurboGears project for Google Apps SSO service. Gheimdall supports PAM and LDAP authentication natively. It also includes sample code to add new authentication methods, which made it very easy to add two-factor authentication from WiKID. WiKID is a dual-source two-factor authentication solution that uses public key cryptography to strongly authenticate users.

  • How To Set Up SSH With Public-Key Authentication On Debian Etch

    Author: DaneeyTags: , Comments: 8

    How To Set Up SSH With Public-Key Authentication On Debian Etch This mini-howto explains how to set up an SSH server on Debian Etch with public-key authorization (and optionally with disabled password logins). SSH is a great tool to control Linux-based computers remotely. It's safe and secure.

  • How to Secure VSFTP with SSL and Two-factor Authentication

    Author: nowenTags: , Comments: 0

    How to Secure VSFTP with SSL and Two-factor AuthenticationRecently, there was a report from Finjan that administrator credentials for over 9,000 FTP servers were for sale. Then, F-Secure noted an increase in FTP-based attacks. Many companies and organization still use FTP extensively. If you're running an FTP server and you think you're admin credentials might be one of those 9,000, you should consider implementing two-factor authentication for SSH, which will then also give you two-factor authentication for SCP. This document shows how to configure the popular and secure VSFTP to use SSL for encryption and WiKID for two-factor authentication for your FTP users.

  • Virus Protection With avast! Linux Home Edition On Ubuntu Gutsy Gibbon

    Author: Falko TimmeTags: , , Comments: 13

    Virus Protection With avast! Linux Home Edition On Ubuntu Gutsy Gibbon This tutorial shows how you can install and use avast! Linux Home Edition on an Ubuntu Gutsy Gibbon desktop. Although there aren't many Linux viruses out there, this can be useful if you often exchange files with Windows users - it can help you to not pass on any Windows viruses (that don't do any harm to Linux systems) to Windows users. avast! Linux Home Edition is free for private and non-commercial use.

  • Chrooting Apache2 With mod_chroot On Debian Etch

    android Author: Falko TimmeTags: , , Comments: 5

    Chrooting Apache2 With mod_chroot On Debian Etch This guide explains how to set up mod_chroot with Apache2 on a Debian Etch system. With mod_chroot, you can run Apache2 in a secure chroot environment and make your server less vulnerable to break-in attempts that try to exploit vulnerabilities in Apache2 or your installed web applications.

  • How To Check If Your Server Is Infected With The Linux/Rst-B Backdoor (Debian Etch)

    Author: Falko TimmeTags: , Comments: 2

    How To Check If Your Server Is Infected With The Linux/Rst-B Backdoor (Debian Etch) Linux Rst-B is a backdoor that can be used to add your server to botnets (see http://www.heise.de/newsticker/meldung/103563 (in German)). This short guide explains how you can install and use the Sophos Linux/RST-B detection tool to check your Debian Etch server and find out if it is infected with Linux Rst-B.

  • Meet the Anti-Nmap: PSAD (EnGarde Secure Linux)

    Author: secureguardianTags: Comments: 0

    Meet the Anti-Nmap: PSAD (EnGarde Secure Linux) Having a great defense involves proper detection and recognition of an attack. In our security world we have great IDS tools to properly recognize when we are being attacked as well as firewalls to prevent such attacks from happening. However, certain attacks are not blindly thrown at you - a good attacker knows that a certain amount of reconnaissance and knowledge about your defenses greatly increases the chances of a successful attack. How would you know if someone is scanning your defenses? Is there any way to properly respond to such scans? You bet there is...

  • Intrusion Detection: Snort (IDS), OSSEC (HbIDS) And Prelude (HIDS) On Ubuntu Gutsy Gibbon

    Author: MiguelTags: , , Comments: 4

    Intrusion Detection: Snort (IDS), OSSEC (HbIDS) And Prelude (HIDS) On Ubuntu Gutsy Gibbon Everybody knows the problem, you have a IDS tool(s) installed and every tool has his own interface. Prelude will allow to log all of the events to the prelude database and be consulted using one interface (prewikka). This howto will describe how to install and configure the different tools that will make up the complete solution.