Linux Tutorials on the topic “security”

  • Securing Your Server With A Host-based Intrusion Detection System

    Author: falkoTags: , , Comments: 5

    Securing Your Server With A Host-based Intrusion Detection System This article shows how to install and run OSSEC HIDS, an Open Source Host-based Intrusion Detection System. It performs log analysis, integrity checking, rootkit detection, time-based alerting and active response. It helps you detect attacks, software misuse, policy violations and other forms of inappropriate activities.

    read more... | add comment | view as pdf | print

  • How to Build an Effective Mail Server Defense

    Author: alinapTags: , , , Comments: 2

    How to Build an Effective Mail Server Defense When speaking of mail server-related security, one tends to limit the issue to message applied security measures, and even more to Antivirus and Antispam protection. This is however only one stage in the more complex process of securing your server. This article aims at identifying and explaining all security layers, highly important when choosing a certain mail server and consequently when configuring and using it.

    read more... | add comment | view as pdf | print

  • What virus scanner is used by ISPConfig 2?

    apache Author: tillTags: , Comments: 0

    ISPConfig 2 uses ClamAV (http://www.clamav.net) as virus scanner and the E-mail Sanitizer (http://www.impsec.org/email-tools/procmail-security.html) as content filter.

    read more... | add comment | view as pdf | print

  • Chkrootkit-Portsentry-Howto

    Author: falkoTags: Comments: 1

    Chkrootkit-Portsentry-HowtoThis document describes how to install chkrootkit and portsentry. It should work (maybe with slight changes concerning paths etc.) on all *nix operating systems. Chkrootkit "is a tool to locally check for signs of a rootkit" (from http://www.chkrootkit.org). "The Sentry tools provide host-level security services for the Unix platform. PortSentry, Logcheck/LogSentry, and HostSentry protect against portscans, automate log file auditing, and detect suspicious login activity on a continuous basis".

    read more... | add comment | view as pdf | print

  • Secure and Private Browsing with Squid

    Author: joeTags: Comments: 12

    Version 1.0 Author: Joe Topjian <joe [at] adminspotting [dot] net> Last edited 05/02/2005 Browsing a site that supports SSL is a definite way to make sure no one can snoop in on what you're doing -- which is a good thing when you're doing something personal like checking email over the web or buying something from amazon. But if you're just doing stuff like reading the daily news or checking movie times, is privacy that important? The ultra-paranoid will give a resounding "yes" to that question while most people will just shrug. I find myself in between those two parties. At home while I'm reading the news, I could care less if the traffic is encrypted or not. However, when I'm at a public wi-fi spot, it does bother me a bit.

    read more... | add comment | view as pdf | print

  • Chrooted SSH HowTo

    VMWare Image Download Author: falkoTags: Comments: 17

    Chrooted SSH HowTo This tutorial describes how to install and configure OpenSSH so that it will allow chrooted sessions for users. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of.

    read more... | add comment | view as pdf | print

  • Preventing SSH Dictionary Attacks With DenyHosts

    Author: falkoTags: Comments: 43

    Preventing SSH Dictionary Attacks With DenyHosts In this HowTo I will show how to install and configure DenyHosts. DenyHosts is a tool that observes login attempts to SSH, and if it finds failed login attempts again and again from the same IP address, DenyHosts blocks further login attempts from that IP address by putting it into /etc/hosts.deny. DenyHosts can be run by cron or as a daemon. In this tutorial I will run DenyHosts as a daemon.

    read more... | add comment | view as pdf | print

  • How To Test Your Linux-Distro Firewall

    Author: kanenas.netTags: Comments: 7

    How To Test Your Linux-Distro Firewall Recently, I wrote an article about how to scan your Linux-Distro for Root Kits. Now that the machine is clean. I think, a good thing to do is to test my Firewall. The good news is that we can use the free tool FTester. The bad news is that FTester needs to be configured right... So... Let's get to work !

    read more... | add comment | view as pdf | print

  • How to scan your Linux-Distro for Root Kits

    Author: kanenas.netTags: Comments: 12

    How to scan your Linux-Distro for Root Kits Do you suspect that you have a compromised system ? Check now for root kits that the intruder may have installed !!! So... What in the hell is a root kit ??? A root kit is a collection of programs that intruders often install after they have compromised the root account of a system. These programs will help the intruders clean up their tracks, as well as provide access back into the system. Root kits will sometimes leave processes running so that the intruder can come back easily and without the system administrator's knowledge !

    read more... | add comment | view as pdf | print

  • Creating A Safe Directory With PAM And EncFS

    Author: stefbonTags: Comments: 5

    Creating A Safe Directory With PAM And EncFS This HowTo is about creating a user-session-safe directory which offers security on- and offline. This is done with PAM, a module named pam_script and EncFS ("Encrypted Filesystem"). This safe directory is used to store credentials and other sensitive information during a session. When a usersession is ended, in the worst case an encrypted directory remains on the harddrive. In the best case everything is removed. This construction is only meant to store information during a session, not for documents or any other valid information.

    read more... | add comment | view as pdf | print