Linux Tutorials on the topic “security”

  • Chrooted SSH/SFTP Tutorial (Debian Lenny)

    debian Author: Falko TimmeTags: , Comments: 33

    Chrooted SSH/SFTP Tutorial (Debian Lenny) Since version 4.8, OpenSSH supports chrooting, so no patches are needed anymore. This tutorial describes how to give users chrooted SSH access. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of. I will also show how to use chrooted SFTP.

  • How to encrypt a diskdrive in (X)Ubuntu Feisty with dm-crypt and LUKS

    Author: Stephan JauTags: , Comments: 4

    How to encrypt a diskdrive in (X)Ubuntu Feisty with dm-crypt and LUKS Today security is one of the key aspects in our daily life - sometimes conscious, sometimes unconscious. Security has many aspects and one of them is computer security or security of your or your business' computer data. In this tutorial I will show how to encrypt a whole disk drive using (X)Ubuntu Feisty, dm-crypt, and LUKS.

  • Using Built-In Revision Control In Firewall Builder

    Author: vkfwbTags: , Comments: 0

    Using Built-In Revision Control In Firewall Builder Firewall Builder GUI has built-in revision control system that can be used to keep track of changes in the objects and policy rules. If data file has been added to the revision control system, every time it is saved, the system asks the user to enter a comment that describes changes done in the file in this session and stores it along with the data. The program also assigns new revision number to the data file using standard software versioning system whith major and minor version numbers separated by a dot. When you open this data file next time, the program presents a list of revisions alongside with dates and comments, letting you choose which revision you want to use. You can open the latest revision and continue working with the file from the point where you left off last time, or open one of the older revisions to inspect how the configuration looked like in the past and possibly create a branch in the revision control system. Here we take a closer look at the built-in revision control system.

  • Getting Started With Firewall Builder

    tux Author: vkfwbTags: , Comments: 0

    Getting Started With Firewall Builder This guide presents an introduction to Firewall Builder. Firewall Builder (also known as fwbuilder) is a GUI firewall configuration and management tool that supports iptables (netfilter), ipfilter, pf, ipfw, Cisco PIX (FWSM, ASA) and Cisco routers extended access lists. Both professional network administrators and hobbyists managing firewalls with policies more complex that is allowed by simple web based UI can simplify management tasks with the application. The program runs on Linux, FreeBSD, OpenBSD, Windows and Mac OS X and can manage both local and remote firewalls.

  • How To Add Two-Factor Authentication To phpBB

    Author: nowenTags: , , , , Comments: 0

    How To Add Two-Factor Authentication To phpBB This document describes how to add WiKID two-factor authentication to phpBB through Apache using mod_auth_xradius. Given the recent attack against phpBB and the exposure of it's users' passwords, we thought two-factor authentication might be timely.

  • Prevent Phishing with Mutual Authentication

    Author: nowenTags: , Comments: 1

    Prevent Phishing with Mutual Authentication Phishing is a man-in-the-middle attack. While many people think using time-bound, one-time passwords will solve the problem, they are wrong as attacks will just become automated. What is required is strong mutual authentication - authentication of the host to the user as well as the user to the host. This article demonstrates how to do that using open-source software from WiKID.

  • How to secure WebDAV with SSL and Two-Factor Authentication

    Author: nowenTags: , Comments: 1

    How to secure WebDAV with SSL and Two-Factor Authentication This how-to documents how to configure a WebDAV resource using SSL and  two-factor authentication and how to access that resource from Windows, Linux and Mac.

  • How to secure an SSL VPN with one-time passcodes and mutual authentication

    Author: nowenTags: Comments: 0

    How to secure an SSL VPN with one-time passcodes and mutual authentication SSL-based VPNs were designed to eliminate the need for complex configurations on the user's PC. Unfortunately, that was before the dangers of public WiFi networks and tougher regulatory requirements came into being. Thanks to WiFi, many attacks that were difficult are now quite simple. In particular, a man-in-the-middle attack can intercept SSL-encrypted traffic, rendering SSL-based VPNs useless - even if it's protected by a typical one-time password system. The man-in-the-middle can easily feed the one-time password into the SSL-based VPN within the alloted time.

  • Configuring SSH To Use Freeradius And WiKID For Two-Factor Authentication

    Author: nowenTags: Comments: 2

    Configuring SSH To Use Freeradius And WiKID For Two-Factor Authentication Radius is a great standard. It is powerful enough to accomplish a great deal and simple enough to be easy to handle. Freeradius is an excellent, open source radius server that ships with many Linux variants. It is well documented and well supported. The WiKID Strong Authentication server is a commercial/open source two-factor authentication system that uses public key encryption to transmit PINs and one-time passcodes securely to software tokens running on Blackberries, cell phones, Palms, PocketPCs or, using the J2SE client, Linux, Macs and Windows PCs. You can think of WiKID like certificates, but without the hassles of white lists/black lists and more secure - because the PIN is validated on the server preventing offline brute-force attacks.

  • How to configure Squid for two-factor authentication from WiKID

    Author: nowenTags: , , Comments: 0

    How to configure Squid for two-factor authentication from WiKID In this guide we will show how Squid can be configured to support two-factor authentication from a WiKID server, allowing users to be centrally authenticated, but their requests still distributed for efficiency.