Linux Tutorials on the topic “security”

  • Virus Protection With AVG Antivirus On Ubuntu Feisty Fawn

    Author: Falko TimmeTags: , , Comments: 10

    Virus Protection With AVG Antivirus On Ubuntu Feisty Fawn This tutorial shows how you can install and use AVG Antivirus on an Ubuntu Feisty Fawn desktop. Although there aren't many Linux viruses out there, this can be useful if you often exchange files with Windows users - it can help you to not pass on any Windows viruses (that don't do any harm to Linux systems) to Windows users. AVG Antivirus for Linux is free for private and non-commercial use.

  • Chrooted SSH/SFTP Tutorial (Debian Etch)

    VMWare Image Download Author: Falko TimmeTags: , Comments: 14

    Chrooted SSH/SFTP Tutorial (Debian Etch) This tutorial describes two ways how to give users chrooted SSH access. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of. The users will also be able to use SFTP in their chroot jails.

  • How To Harden PHP5 With Suhosin On OpenSuSE 10.2

    Author: Falko TimmeTags: , , Comments: 0

    How To Harden PHP5 With Suhosin On OpenSuSE 10.2 This tutorial shows how to harden PHP5 with Suhosin on an OpenSuSE 10.2 server. From the Suhosin project page: "Suhosin is an advanced protection system for PHP installations that was designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core. Suhosin comes in two independent parts, that can be used separately or in combination. The first part is a small patch against the PHP core, that implements a few low-level protections against buffer overflows or format string vulnerabilities and the second part is a powerful PHP extension that implements all the other protections."

  • How To Harden PHP5 With Suhosin On CentOS 5.0

    Author: Falko TimmeTags: , , Comments: 3

    How To Harden PHP5 With Suhosin On CentOS 5.0 This tutorial shows how to harden PHP5 with Suhosin on a CentOS 5.0 server. From the Suhosin project page: "Suhosin is an advanced protection system for PHP installations that was designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core. Suhosin comes in two independent parts, that can be used separately or in combination. The first part is a small patch against the PHP core, that implements a few low-level protections against bufferoverflows or format string vulnerabilities and the second part is a powerful PHP extension that implements all the other protections."

  • How To Harden PHP5 With Suhosin On Fedora 7

    Author: Falko TimmeTags: , , Comments: 0

    How To Harden PHP5 With Suhosin On Fedora 7 This tutorial shows how to harden PHP5 with Suhosin on a Fedora 7 server. From the Suhosin project page: "Suhosin is an advanced protection system for PHP installations that was designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core. Suhosin comes in two independent parts, that can be used separately or in combination. The first part is a small patch against the PHP core, that implements a few low-level protections against bufferoverflows or format string vulnerabilities and the second part is a powerful PHP extension that implements all the other protections."

  • How To Harden PHP5 With Suhosin On Mandriva 2007 Spring

    Author: Falko TimmeTags: , , Comments: 0

    How To Harden PHP5 With Suhosin On Mandriva 2007 Spring This tutorial shows how to harden PHP5 with Suhosin on a Mandriva 2007 Spring server. From the Suhosin project page: "Suhosin is an advanced protection system for PHP installations that was designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core. Suhosin comes in two independent parts, that can be used separately or in combination. The first part is a small patch against the PHP core, that implements a few low-level protections against buffer overflows or format string vulnerabilities and the second part is a powerful PHP extension that implements all the other protections."

  • How to Avoid Being Blacklisted

    Author: alinapTags: , , Comments: 2

    How to Avoid Being Blacklisted A blacklist usually refers to a list of e-mail or IP addresses known to send spam e-mails or some other type of unsolicited messages. Such lists are currently used by mail servers for filtering incoming e-mails and blocking the ones listed, in order to improve mail security and integrity. The blacklist is also the opposite of what is called a whitelist.

  • TrueCrypt Tutorial: Truly Portable Data Encryption

    Author: lipiecTags: Comments: 9

    TrueCrypt Tutorial: Truly Portable Data Encryption TrueCrypt is a free software that encrypts data “on-the-fly”. Right now the newest version released is version 4.3. You can create an encrypted hard drive, a separate partition or a directory with TrueCrypt. It doesn’t simply encrypt the content of files, but their names and the names of the directories they are in as well. Moreover there is no way to check the size of the encrypted directory/HDD/partition. TrueCrypt is available for Windows and Linux.

  • Installing ModSecurity2 On Debian Etch

    Author: Falko TimmeTags: , , Comments: 15

    Installing ModSecurity2 On Debian Etch This article shows how to install and configure ModSecurity (version 2) for use with Apache2 on a Debian Etch system. ModSecurity is an Apache module that provides intrusion detection and prevention for web applications. It aims at shielding web applications from known and unknown attacks, such as SQL injection attacks, cross-site scripting, path traversal attacks, etc.

  • Introduction to Antispam Practices

    Author: alinapTags: , Comments: 1

    Introduction to Antispam Practices Competitive Antispam products, proper legislation, efforts towards a better user education, it has all been tried in order to stop spam. However, unsolicited emails keep consuming the space and time of all email users. Moreover, spam messages can be the cause of serious virus and spyware outbreaks, while others “phish” for sensitive information like bank accounts and passwords.