Linux Tutorials on the topic “security”
-
Chrooted SSH/SFTP Tutorial (Debian Lenny)
Author: Falko Timme • Tags: security, debian • Comments: 33
Chrooted SSH/SFTP Tutorial (Debian Lenny) Since version 4.8, OpenSSH supports chrooting, so no patches are needed anymore. This tutorial describes how to give users chrooted SSH access. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of. I will also show how to use chrooted SFTP.
-
How to encrypt a diskdrive in (X)Ubuntu Feisty with dm-crypt and LUKS
Author: Stephan Jau • Tags: security, ubuntu • Comments: 4How to encrypt a diskdrive in (X)Ubuntu Feisty with dm-crypt and LUKS Today security is one of the key aspects in our daily life - sometimes conscious, sometimes unconscious. Security has many aspects and one of them is computer security or security of your or your business' computer data. In this tutorial I will show how to encrypt a whole disk drive using (X)Ubuntu Feisty, dm-crypt, and LUKS.
-
Using Built-In Revision Control In Firewall Builder
Author: vkfwb • Tags: desktop, security • Comments: 0Using Built-In Revision Control In Firewall Builder Firewall Builder GUI has built-in revision control system that can be used to keep track of changes in the objects and policy rules. If data file has been added to the revision control system, every time it is saved, the system asks the user to enter a comment that describes changes done in the file in this session and stores it along with the data. The program also assigns new revision number to the data file using standard software versioning system whith major and minor version numbers separated by a dot. When you open this data file next time, the program presents a list of revisions alongside with dates and comments, letting you choose which revision you want to use. You can open the latest revision and continue working with the file from the point where you left off last time, or open one of the older revisions to inspect how the configuration looked like in the past and possibly create a branch in the revision control system. Here we take a closer look at the built-in revision control system.
-
-
Getting Started With Firewall Builder
Author: vkfwb • Tags: desktop, security • Comments: 0
Getting Started With Firewall Builder This guide presents an introduction to Firewall Builder. Firewall Builder (also known as fwbuilder) is a GUI firewall configuration and management tool that supports iptables (netfilter), ipfilter, pf, ipfw, Cisco PIX (FWSM, ASA) and Cisco routers extended access lists. Both professional network administrators and hobbyists managing firewalls with policies more complex that is allowed by simple web based UI can simplify management tasks with the application. The program runs on Linux, FreeBSD, OpenBSD, Windows and Mac OS X and can manage both local and remote firewalls.
-
How To Add Two-Factor Authentication To phpBB
Author: nowen • Tags: apache, linux, mysql, php, security • Comments: 0How To Add Two-Factor Authentication To phpBB This document describes how to add WiKID two-factor authentication to phpBB through Apache using mod_auth_xradius. Given the recent attack against phpBB and the exposure of it's users' passwords, we thought two-factor authentication might be timely.
-
Prevent Phishing with Mutual Authentication
Author: nowen • Tags: antivirus, security • Comments: 1Prevent Phishing with Mutual Authentication Phishing is a man-in-the-middle attack. While many people think using time-bound, one-time passwords will solve the problem, they are wrong as attacks will just become automated. What is required is strong mutual authentication - authentication of the host to the user as well as the user to the host. This article demonstrates how to do that using open-source software from WiKID.
-
How to secure WebDAV with SSL and Two-Factor Authentication
Author: nowen • Tags: apache, security • Comments: 1How to secure WebDAV with SSL and Two-Factor Authentication This how-to documents how to configure a WebDAV resource using SSL and two-factor authentication and how to access that resource from Windows, Linux and Mac.
-
How to secure an SSL VPN with one-time passcodes and mutual authentication
Author: nowen • Tags: security • Comments: 0How to secure an SSL VPN with one-time passcodes and mutual authentication SSL-based VPNs were designed to eliminate the need for complex configurations on the user's PC. Unfortunately, that was before the dangers of public WiFi networks and tougher regulatory requirements came into being. Thanks to WiFi, many attacks that were difficult are now quite simple. In particular, a man-in-the-middle attack can intercept SSL-encrypted traffic, rendering SSL-based VPNs useless - even if it's protected by a typical one-time password system. The man-in-the-middle can easily feed the one-time password into the SSL-based VPN within the alloted time.
-
Configuring SSH To Use Freeradius And WiKID For Two-Factor Authentication
Author: nowen • Tags: security • Comments: 2Configuring SSH To Use Freeradius And WiKID For Two-Factor Authentication Radius is a great standard. It is powerful enough to accomplish a great deal and simple enough to be easy to handle. Freeradius is an excellent, open source radius server that ships with many Linux variants. It is well documented and well supported. The WiKID Strong Authentication server is a commercial/open source two-factor authentication system that uses public key encryption to transmit PINs and one-time passcodes securely to software tokens running on Blackberries, cell phones, Palms, PocketPCs or, using the J2SE client, Linux, Macs and Windows PCs. You can think of WiKID like certificates, but without the hassles of white lists/black lists and more secure - because the PIN is validated on the server preventing offline brute-force attacks.
-
How to configure Squid for two-factor authentication from WiKID
Author: nowen • Tags: apache, linux, security • Comments: 0How to configure Squid for two-factor authentication from WiKID In this guide we will show how Squid can be configured to support two-factor authentication from a WiKID server, allowing users to be centrally authenticated, but their requests still distributed for efficiency.