Linux Tutorials on the topic “security”
-
Preventing SSH Dictionary Attacks With DenyHosts
Author: Falko Timme • Tags: security • Comments: 43Preventing SSH Dictionary Attacks With DenyHosts In this HowTo I will show how to install and configure DenyHosts. DenyHosts is a tool that observes login attempts to SSH, and if it finds failed login attempts again and again from the same IP address, DenyHosts blocks further login attempts from that IP address by putting it into /etc/hosts.deny. DenyHosts can be run by cron or as a daemon. In this tutorial I will run DenyHosts as a daemon.
-
How To Test Your Linux-Distro Firewall
Author: kanenas.net • Tags: security • Comments: 7How To Test Your Linux-Distro Firewall Recently, I wrote an article about how to scan your Linux-Distro for Root Kits. Now that the machine is clean. I think, a good thing to do is to test my Firewall. The good news is that we can use the free tool FTester. The bad news is that FTester needs to be configured right... So... Let's get to work !
-
How to scan your Linux-Distro for Root Kits
Author: kanenas.net • Tags: security • Comments: 12How to scan your Linux-Distro for Root Kits Do you suspect that you have a compromised system ? Check now for root kits that the intruder may have installed !!! So... What in the hell is a root kit ??? A root kit is a collection of programs that intruders often install after they have compromised the root account of a system. These programs will help the intruders clean up their tracks, as well as provide access back into the system. Root kits will sometimes leave processes running so that the intruder can come back easily and without the system administrator's knowledge !
-
-
Creating A Safe Directory With PAM And EncFS
Author: stefbon • Tags: security • Comments: 5Creating A Safe Directory With PAM And EncFS This HowTo is about creating a user-session-safe directory which offers security on- and offline. This is done with PAM, a module named pam_script and EncFS ("Encrypted Filesystem"). This safe directory is used to store credentials and other sensitive information during a session. When a usersession is ended, in the worst case an encrypted directory remains on the harddrive. In the best case everything is removed. This construction is only meant to store information during a session, not for documents or any other valid information.
-
Security Testing your Apache Configuration with Nikto
Author: xenlab • Tags: apache, security • Comments: 11Security Testing your Apache Configuration with Nikto By now you've got the perfect setup for your new Ubuntu 6.0.6 (Dapper Drake) box. You may have even followed the excellent Intrusion Detection and Prevention with BASE and Snort tutorial. And as an added precaution you installed DenyHosts to prevent hack attempts via ssh. But now that you've got your new LAMP server on the internet, how can you tell that your new web server is secure? You test it, of course!
-
Securing the CentOS Server with Bastille and PSAD
Author: treed • Tags: centos, security • Comments: 1
Securing the CentOS Perfect Setup with Bastille. This article shows how to secure a CentOS server using psad, Bastille, and some other tweaks. psad is a tool that helps detect port scans and other suspicious traffic, and the Bastille hardening program locks down an operating system, proactively configuring the system for increased security and decreasing its susceptibility to compromise.
-
How to Setup Port-Forwarding on OPNSense
Author: Muhammad Arul • Tags: networking, security • Comments: 0
This guide will show you how to set up NAT Port Forwarding on the OPNSense Firewall Router. We will allow public internet to access the server inside the private LAN. Allow SSH and HTTP connections from the public internet to the server on the private LAN.