Linux Tutorials on the topic “security”
-
Chrooting Apache2 With mod_chroot On Debian Etch
Author: Falko Timme • Tags: apache, debian, security • Comments: 5
Chrooting Apache2 With mod_chroot On Debian Etch This guide explains how to set up mod_chroot with Apache2 on a Debian Etch system. With mod_chroot, you can run Apache2 in a secure chroot environment and make your server less vulnerable to break-in attempts that try to exploit vulnerabilities in Apache2 or your installed web applications.
-
How To Check If Your Server Is Infected With The Linux/Rst-B Backdoor (Debian Etch)
Author: Falko Timme • Tags: debian, security • Comments: 2How To Check If Your Server Is Infected With The Linux/Rst-B Backdoor (Debian Etch) Linux Rst-B is a backdoor that can be used to add your server to botnets (see http://www.heise.de/newsticker/meldung/103563 (in German)). This short guide explains how you can install and use the Sophos Linux/RST-B detection tool to check your Debian Etch server and find out if it is infected with Linux Rst-B.
-
Meet the Anti-Nmap: PSAD (EnGarde Secure Linux)
Author: secureguardian • Tags: security • Comments: 0Meet the Anti-Nmap: PSAD (EnGarde Secure Linux) Having a great defense involves proper detection and recognition of an attack. In our security world we have great IDS tools to properly recognize when we are being attacked as well as firewalls to prevent such attacks from happening. However, certain attacks are not blindly thrown at you - a good attacker knows that a certain amount of reconnaissance and knowledge about your defenses greatly increases the chances of a successful attack. How would you know if someone is scanning your defenses? Is there any way to properly respond to such scans? You bet there is...
-
-
Intrusion Detection: Snort (IDS), OSSEC (HbIDS) And Prelude (HIDS) On Ubuntu Gutsy Gibbon
Author: Miguel • Tags: security, ubuntu, monitoring • Comments: 4Intrusion Detection: Snort (IDS), OSSEC (HbIDS) And Prelude (HIDS) On Ubuntu Gutsy Gibbon Everybody knows the problem, you have a IDS tool(s) installed and every tool has his own interface. Prelude will allow to log all of the events to the prelude database and be consulted using one interface (prewikka). This howto will describe how to install and configure the different tools that will make up the complete solution.
-
How to install the WiKID Strong Authentication Server - Community Edition
Author: nowen • Tags: security • Comments: 0How to install the WiKID Strong Authentication Server - Community Edition The WiKID Strong Authentication Server is a dual-source two-factor authentication system. PINs are encrypted on a software token and sent to the WiKID server. If the PIN is correct, the encryption valid and the account active, a one-time password is generated, encrypted and returned to the user's token where it is decrypted and presented for use with a network-based services. While there are a number of tutorials on how to combine WiKID's two-factor system a variety of systems (such as SSH, OpenVPN, Apache and SSL-VPNs), this is the first to address how to install the WiKID Server.
-
Intrusion Detection: Snort, Base, MySQL, and Apache2 On Ubuntu 7.10 (Gutsy Gibbon) (Updated)
Author: volksman • Tags: debian, linux, monitoring, security, ubuntu • Comments: 9Intrusion Detection: Snort, Base, MySQL, and Apache2 On Ubuntu 7.10 (Gutsy Gibbon) (Updated) In this tutorial I will describe how to install and configure Snort (an intrusion detection system (IDS)) from source, BASE (Basic Analysis and Security Engine), MySQL, and Apache2 on Ubuntu 7.10 (Gutsy Gibbon). Snort will assist you in monitoring your network and alert you about possible threats. Snort will output its log files to a MySQL database which BASE will use to display a graphical interface in a web browser.
-
SSH: Best Practices
Author: secureguardian • Tags: security • Comments: 5SSH: Best Practices Are you using SSH in the best way possible? Have you configured it to be as limited and secure as possible? The goal of this document is to kick in the new year with some best practices for SSH: why you should use them, how to set them up, and how to verify that they are in place. All of the examples below assume that you are using EnGarde Secure Linux but any modern Linux distribution will do just fine since, as far as I know, everybody ships OpenSSH.
-
TrueCrypt With GUI On Ubuntu 7.10
Author: o.meyer • Tags: desktop, security, ubuntu • Comments: 1TrueCrypt With GUI On Ubuntu 7.10 This document describes how to set up TrueCrypt with GUI on Ubuntu 7.10. TrueCrypt is a free open-source encryption software for desktop usage.
-
How To Update The Kernel For Smoothwall Express 3.0
Author: sungun • Tags: security • Comments: 1How To Update The Kernel For Smoothwall Express 3.0 This is a guide for building a new kernel for Smoothwall Express 3.0. Smoothwall Express 3.0 is a UTM Internet Gataway Distro for X86 PC. But it is mainly used on older 386 PCs. If you want use it on a newer CPU, you will only get a "386"PC. So we must update the kernel for SW 3.0.
-
Writing Snort Rules On EnGarde
Author: secureguardian • Tags: security • Comments: 0Writing Snort Rules On EnGarde There are already tons of written Snort rules, but there just might be a time where you need to write one yourself. You can think of writing Snort rules as writing a program. They can include variables, keywords and functions. Why do we need to write rules? The reason is, without rules Snort will never detect someone trying to hack your machine. This HOWTO will give you confidence to write your own rules.