Linux Tutorials on the topic “security”
-
How to configure OpenVPN to use WiKID Strong Authentication
Author: nowen • Tags: security • Comments: 0How to configure OpenVPN to use WiKID Strong Authentication The WiKID Strong Authentication System is a commercial/open source two-factor authentication solution. This guide demonstrates how to OpenVPN and SSH to use one-time passwords from WiKID. While both solutions support private key authentication, that may not be sufficient for your requirements; you may need one-time passwords for webmail or extranet access; or centralized authentication management and logging.
-
How To Configure Apache To Use Radius For Two-Factor Authentication On Ubuntu
Author: nowen • Tags: apache, debian, security, ubuntu • Comments: 1
How To Configure Apache To Use Radius For Two-Factor Authentication On Ubuntu This document describes how to add WiKID two-factor authentication to Apache 2.x using mod_auth_radius on Ubuntu 8.1. A previous article described how to add two factor authentication to apache on Fedora. Interestingly, a patch has been created to update mod_auth_radius to work with Apache 2.2+, however, it has only been updated for Debian and Ubuntu. For Fedora and other RedHat flavors of Linux, it is recommended that you use mod_auth_xradius.
-
Setting Up ProFTPd + TLS On Ubuntu 8.10 (Intrepid Ibex)
Author: Falko Timme • Tags: ftp, security, ubuntu • Comments: 3
Setting Up ProFTPd + TLS On Ubuntu 8.10 (Intrepid Ibex) FTP is a very insecure protocol because all passwords and all data are transferred in clear text. By using TLS, the whole communication can be encrypted, thus making FTP much more secure. This article explains how to set up ProFTPd with TLS on an Ubuntu 8.10 server.
-
-
Installing ISP-fw (Firewall) On Linux
Author: htb • Tags: debian, security • Comments: 2
Installing ISP-fw (Firewall) On Linux ISP-fW is a firewall script that provides port forwarding, packet filtering, stateful packet inspection, port redirection, masquerading, SNAT/ DNAT, TOS, and never the last it generates htb rules for bandwidth management. With ISP-fw, you can turn a PC into a gateway with shaping capabilities.
-
Preventing MySQL Injection Attacks With GreenSQL On Debian Etch
Author: Falko Timme • Tags: debian, mysql, security • Comments: 1
Preventing MySQL Injection Attacks With GreenSQL On Debian Etch GreenSQL (or greensql-fw) is a firewall for MySQL databases that filters SQL injection attacks. It works as a reverse proxy, i.e., it takes the SQL queries, checks them, passes them on to the MySQL database and delivers back the result from the MySQL database. It comes with a web interface (called greensql-console) so that you can manage GreenSQL through a web browser. This guide shows how you can install GreenSQL and its web interface on a Debian Etch server.
-
Ultimate Security Proxy With Tor
Author: Tb0hdan • Tags: security • Comments: 31
Ultimate Security Proxy With Tor Nowadays, within the growing web 2.0 environment you may want to have some anonymity, and use other IP addresses than your own IP. Or, for some special purposes - a few IPs or more, frequently changed. So no one will be able to track you. A solution exists, and it is called Tor Project, or simply tor. There are a lot of articles and howtos giving you the idea of how it works, I'm not going to describe here onion routing and its principles, I'll rather tell you how practically pull out the maximum out of it.
-
Firewall Management With Gufw On Ubuntu 8.04
Author: Falko Timme • Tags: security, ubuntu • Comments: 1Firewall Management With Gufw On Ubuntu 8.04 Gufw is a graphical frontend for managing an iptables firewall on an Ubuntu 8.04 desktop. It is based on ufw and enables you to allow or block pre-configured, common p2p, or individual ports. This guide shows how you can install and use Gufw on Ubuntu 8.04.
-
Secure SSH Using WiKID Two-Factor Authentication And TACACS+
Author: nowen • Tags: linux, security • Comments: 0Secure SSH Using WiKID Two-Factor Authentication And TACACS+ These instructions are designed to help you configure and test using the WiKID TACACS+ protocol module via Linux PAM on Red Hat. This document has been updated to cover pam .99 and higher. We assume that you have already installed the open-source WiKID Strong Authentication Server Community Edition.
-
Spam Blocking And Web Filtering With The Untangle 5.3 Network Gateway
Author: Falko Timme • Tags: linux, security • Comments: 1Spam Blocking And Web Filtering With The Untangle 5.3 Network Gateway Untangle bundles common open-source applications for blocking spam, spyware, viruses, adware and unwanted content on the network in one single Linux distribution. It can be integrated into existing networks either as a router or as a transparent bridge (directly behind the router, but before the switch that connects the client PCs with the router). The best thing about Untangle is that you don't have to reconfigure the client PCs - Untangle works out of the box.
-
Preventing Brute Force Attacks With Fail2ban On Mandriva 2008.1
Author: Falko Timme • Tags: mandriva, security • Comments: 0Preventing Brute Force Attacks With Fail2ban On Mandriva 2008.1 In this article I will show how to install and configure fail2ban on a Mandriva 2008.1 system. Fail2ban is a tool that observes login attempts to various services, e.g. SSH, FTP, SMTP, Apache, etc., and if it finds failed login attempts again and again from the same IP address or host, fail2ban stops further login attempts from that IP address/host by blocking it with an iptables firewall rule.