Linux Tutorials on the topic “security”

  • Preventing Brute Force Attacks With Fail2ban On Fedora 9

    Author: Falko TimmeTags: , Comments: 0

    Preventing Brute Force Attacks With Fail2ban On Fedora 9 In this article I will show how to install and configure fail2ban on a Fedora 9 system. Fail2ban is a tool that observes login attempts to various services, e.g. SSH, FTP, SMTP, Apache, etc., and if it finds failed login attempts again and again from the same IP address or host, fail2ban stops further login attempts from that IP address/host by blocking it with an iptables firewall rule.

  • Running Vhosts Under Separate UIDs/GIDs With Apache2 mpm-peruser On Debian Etch

    VMWare Image Download Author: Falko TimmeTags: , , Comments: 0

    Running Vhosts Under Separate UIDs/GIDs With Apache2 mpm-peruser On Debian Etch This article explains how you can install and configure apache2-mpm-peruser on a Debian Etch server. apache2-mpm-peruser is an MPM (Multi-Processing Module) for the Apache 2 web server, very similar to apache2-mpm-itk, but faster (almost as fast as apache2-mpm-prefork). mpm-peruser allows you to run each of your vhosts under a separate UID and GID - in short, the scripts and configuration files for one vhost no longer have to be readable for all the other vhosts. It is based on metuxmpm, a working implementation of the perchild MPM. The result is a sane and secure web server environment for your users, without kludges like PHP's safe_mode.

  • HOWTO: Encrypt The System Manually Upon Installation (Ubuntu 8.04)

    Author: Stephan JauTags: , Comments: 3

    HOWTO: Encrypt The System Manually Upon Installation (Ubuntu 8.04) This tutorial describes how you can encrypt an Ubuntu 8.04 (Hardy Heron) system right during the initial installation.

  • HOWTO: Automatically Unlock LUKS Encrypted Drives With A Keyfile

    Author: sjauTags: Comments: 25

    HOWTO: Automatically Unlock LUKS Encrypted Drives With A Keyfile This howto shows how to unlock multiple devices in the intial ramdisk remotely. I suggest to use a keyfile for automatic unlocking. The keyfile should be stored in the normally encrypted root partition - so you still have to unlock that one. During boot process it will then be used to unlock all the other devices.

  • How To Block Spammers/Hackers With mod_defensible On Apache2 (Debian Etch)

    VMWare Image Download Author: Falko TimmeTags: , , Comments: 7

    How To Block Spammers/Hackers With mod_defensible On Apache2 (Debian Etch) mod_defensible is an Apache 2.x module intended to block spammers/hackers/script kiddies using DNSBL servers. It will look at the client IP and check it in one or several DNSBL servers and return a 403 Forbidden page to the client. This guide shows how to install and use it with Apache 2 on a Debian Etch server.

  • How To Set Up Shorewall (Shoreline) 4.0 Firewall On CentOS 5.1

    Author: poustchiTags: , Comments: 1

    How To Set Up Shorewall (Shoreline) 4.0 Firewall On CentOS 5.1 This tutorial will walk you through setting up Shorewall (Shoreline) 4.0 firewall on CentOS 5.1 , this can easily be adapted to any other Linux distribution out there.

  • The Bash Script To Configure The Firewall Using IPTABLES

    Author: ajaonchatTags: , , Comments: 1

    About the Script: This script is about to build a firewall in Linux OS by using iptables, the user only needs to follow and answer the simple and easy steps and the script will generate the user specified iptables rule in its original form. I HAVE TESTED THE SCRIPT ON PCLINUXOS, FEDORA-9, DREAM_LINUX, UBUNTU-8. This is my iptables Version 1.0 (USMAN AKRAM - Lucky)

  • How To Secure Postgresql Using Two-Factor Authentication From WiKID

    Author: nowenTags: , Comments: 0

    How To Secure Postgresql Using Two-Factor Authentication From WiKID Databases are the key repository for critical data.  If you are storing information that needs to be kept secure from prying eyes, especially credit card or personally identifiable information (PII) you might be required to control access using two-factor authentication.  This tutorial demonstrates how to secure Postgresql with two-factor authentication from WiKID.

  • Intrusion Detection For PHP Applications With PHPIDS

    Author: Falko TimmeTags: , Comments: 5

    Intrusion Detection For PHP Applications With PHPIDS This tutorial explains how to set up PHPIDS on a web server with Apache2 and PHP5. PHPIDS (PHP-Intrusion Detection System) is a simple to use, well structured, fast and state-of-the-art security layer for your PHP based web application. The IDS neither strips, sanitizes nor filters any malicious input, it simply recognizes when an attacker tries to break your site and reacts in exactly the way you want it to. Based on a set of approved and heavily tested filter rules any attack is given a numerical impact rating which makes it easy to decide what kind of action should follow the hacking attempt. This could range from simple logging to sending out an emergency mail to the development team, displaying a warning message for the attacker or even ending the user’s session.

  • Setting Up An SSH Certificate For Ubuntu From A Mac

    Author: bswinnertonTags: , Comments: 10

    Setting Up An SSH Certificate For Ubuntu From A Mac This howto should help you with setting up an RSA public and private key setup from a Mac to an Ubuntu box. Of course, this should be possible with other OS's but I have not tested it.