LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: July 25th, 2014
Linux Advisory Watch: July 18th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Harden my filesystem
Find the HOWTO or step-by-step guide that you need right here.


UNIX Network Scanning  07 December 2007 
Source: IBM Developer Works - Posted by Ryan Berens   
A bit of a shift towards UNIX for those looking to a get a different view of network scanning:
Discover how to scan your network for services and how to regularly monitor your services to keep uptimes to a maximum. A key way of ensuring the security of your network is to know what is on your network and what services individual machines are at risk of exposure. Unauthorized services, such as Web servers or file sharing solutions, not only degrade performance, but others can use these services as routes into your network. In this article, learn how to use these same techniques to ensure that genuine services remain available.
 
Take Control of your VPN Connections with Boot CD's  21 November 2007 
Source: www.linux.com - Posted by Ryan Berens   
This will show you how to take boot CD's and make them hardened enough for what you need in any VPN application. From the introduction:

For several years now, users at the Institution where I currently work part-time have expressed a need for a robust and secure connection to the internal network. The internal network actually has some clients that are on private networks and some clients that are Internet-route-able.

Being mostly a Microsoft shop, the options that have been available were not deemed appropriate for various reasons, usually due to security concerns. After being introduced to the problem a few months ago and listening to the concerns surrounding it, I suggested using a boot CD, which would alleviate all of their security concerns. They gave me the go ahead to give it a try. I now have a working prototype and this document describes the process used to create it.
 
Lock-Down Ubuntu 7.10 Gutsy-Gibbon  20 November 2007 
Source: HowToForge.com - Posted by Ryan Berens   
Ubuntu Gutsy-Gibbon on the brain? Looking to set up a solid defense with Intrusion Detection Snort, MySQL and more? HowToForge has a great guide from a contributor, Devilman:

In this tutorial I will describe how to install and configure Snort (an intrusion detection system (IDS)) from source, BASE (Basic Analysis and Security Engine), MySQL, and Apache2 on Ubuntu 7.10 (Gutsy Gibbon). Snort will assist you in monitoring your network and alert you about possible threats. Snort will output its log files to a MySQL database which BASE will use to display a graphical interface in a web browser.

Read on...
 
Securing and Hardening Red Hat Linux Production Systems  15 November 2007 
Posted by Ryan Berens   
This is a recently found HOWTO, and is an amazing and comprehensive resource for getting many different Linux systems secure.

This Linux Security HOWTO is intended for a technical audience, Linux system administrators, and security people in corporations and organizations that have to use commercial Linux distributions for their production environment.

Check out the index for a complete listing of what this HOWTos Cover.

The description also states it is "A Practical Guide to Basic Linux Security in Production Enterprise Environments"

Written by Werner Puschitz
 
Adding Modules to BackTrack In linux  15 November 2007 
Posted by Ryan Berens   
BackTrack, the penetration testing distribution, is a great LIve-CD to test a system and tear it apart. This HOWTO:

One of BackTracks' most appealing features is it's modularity. As an end user, you can add your own modules scripts and tools to the livecd.
 
Protecting Data with Encrypted Linux Partitions  09 November 2007 
Source: www.LinuxPlanet.com - Posted by Ryan Berens   
All too often, you hear the story of how X number of laptops or social security numbers were stolen from company Y. And why is so little attention paid to how and why that information was left unprotected and so easily accessible?

There are many ways to combat this problem. One of the best ways is with encryption. And Carla Schroder takes us through a great way

Today let us focus on the issue of protecting sensitive data on hard drives with encrypted file systems. This is for your mobile users and anyone who needs extra data security on workstations and servers. We're going to use cryptsetup-luks because it is easy and it is strong. We will create an encrypted partition that requires a passphrase only at mount time. Then you can use it just like any other partition. Nice summary and easy to follow.
 
Opening Secure Ports  07 November 2007 
Source: NixCraft - Posted by Ryan Berens   
A curious user asks:

Q. Iíve Redhat Enterprise Linux 5 server with Iptables firewall enabled. By default it is only allowing port 22. How do I open port 80 / 143 / 110 on Linux? Iíve started all services but donít know how to open port using iptables? Read on for a quick HowTo and getting your ports in order.
 
How to Secure Ubuntu With AppArmor  31 October 2007 
Source: BeginLinux.com - Posted by Ryan Berens   
AppArmor is one way to protect your assets on your Ubuntu Gutsy system.

AppArmor attempts to protect processes on the server or desktop from security threats. AppArmor enforces limits on what processes can access on the system. It attempts to restrict processes to those resources that the process requires to function only.
If you wanted to give AppArmor a try, and SELinux isn't your flavor, get your start here.
 
Giving RSYNC a run for its money: Duplicity???  10 September 2007 
Posted by Ryan Berens   
According to the Merriam-Webster online dictionary, duplicity is defined as "contradictory doubleness of thought, speech, or action." To the more Linux-initiated, however, it is an exceedingly useful tool. Make no mistakes about it, Duplicity is a very capable way of encrypting data and throwing its weight around against the standard Rsync. Read here to learn more about why duplicity is an alternative worth looking into.
 
Breaking Firewalls with OpenSSH and PuTTY  01 August 2006 
Source: "Breaking Firewalls with OpenSSH and PuTTY" - Posted by Administrator   
If the system administrator deliberately filters out all traffic except port 22 (ssh), to a single server, it is very likely that you can still gain access other computers behind the firewall. This article shows how remote Linux and Windows users can
 
<< Start < Prev 1 2 3 Next > End >>

Results 1 - 10 of 121
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Four fake Google haxbots hit YOUR WEBSITE every day
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
The Barnaby Jack Few Knew: Celebrated Hacker Saw Spotlight as 'Necessary Evil'
What I Learned from Edward Snowden at the Hacker Conference
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.