LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: September 15th, 2014
Linux Security Week: September 8th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Strengthen my privacy
Find the HOWTO or step-by-step guide that you need right here.


OS Tool of the Month: Gnu Privacy Guard (GnuPG) Mini Howto  22 January 2008 
Posted by Ryan Berens   
Originall written in 2004, here you will find one of the most extensive HowTo's available for GnuPG. It truly is a 'soup to nuts' overview.

This documents explains how to use the GNU Privacy Guard (GnuPG), an Open Source OpenPGP compatible encryption system. To keep this program totally free the use of the RSA algorithm and other patented algorithm has been avoided. The document was originally written by Michael Fischer v. Mollar in German.
 
Security with Keystroke Dynamics  08 January 2008 
Source: IBM Developerworks - Posted by Ryan Berens   
Are you always looking to expand your security practices? Do you want to take a crack at instituting a whole new way of creating a secure, password infrastructure? If so, this article on keystroke dynamics can help you break into whole new worlds of security...

Measure the total time of entry and verify the time between keystrokes to help authenticate a user regardless of the data being entered. Require nonprintable characters, such as backspace and break, in the password to enable new levels of password obfuscation. Learn how to apply the open source tools xev and Perl in keystroke dynamics to measure the more-subtle characteristics of human-computer interaction.

The whorls and ridges on your fingertips can identify you based on what you touch. How you touch and especially type can often be just as unique an activity. Keystroke dynamics is a relatively new field that enables identification of individuals through statistical analysis of their typing patterns. Many commercial products analyze the dynamics of password entry, as well as continuous typing monitoring for enhanced security. This article uses example code to demonstrate keystroke dynamics for enhancing the security of your applications in authentication and continuous data entry contexts.
 
How to: Restrict Users to SCP and SFTP and Block SSH Shell Access with rssh  02 January 2008 
Posted by Administrator   
A quick HowTo on using secure FTP to transfer files. What is sftp?

SCP/SFTP -> SSHD -> Call sftpd subsystem -> Requires a shell -> User can login to server and run other commands.

In this article series we will help you provide secure restricted file-transfer services to your users without resorting to FTP. It also covers chroot jail setup instructions to lock down users to their own home directories (allow users to transfer files but not browse the entire Linux / UNIX file system of the server) as well as per user configurations.
 
Disk Encryption HOWTO  20 June 2006 
Source: "Disk Encryption HOWTO" - Posted by Administrator   
A method is described for encrypting a hard disk, either in whole or in part, with the encryption key stored on an external medium for increased security.
 
Encrypted Root Filesystem HOWTO  20 June 2006 
Source: "Encrypted Root Filesystem HOWTO" - Posted by Administrator   
Explains how to make your personal data secure by encrypting your Linux root filesystem using strong cryptography.
 
Cryptographic Filesystems: Design and Implementation  29 November 2004 
Source: "Cryptographic Filesystems: Design and Implementation" - Posted by Administrator   
This article will discuss some of the background and technology of cryptographic filesystems and will then cover some example implementations of these filesystems including Microsoft's Encrypting File System for Windows 2000, the Linux CryptoAPI, and
 
XML Security Library  29 November 2004 
Source: "XML Security Library" - Posted by Administrator   
XML Security Library is a C library based on LibXML2.
 
Non-stop authentication with Linux clusters  29 November 2004 
Source: "Non-stop authentication with Linux clusters" - Posted by Administrator   
This documentation discusses how IBM uses an LDAP (Lightweight Directory Access Protocol) server to provide authentication services to which various applications can subscribe. It also discusses how they use the heartbeat package from the Linux-HA in
 
The GNU Transport Layer Security Library  29 November 2004 
Source: "The GNU Transport Layer Security Library" - Posted by Administrator   
GnuTLS is a project that aims to develop a library which provides a secure layer, over a reliable transport layer (ie. TCP/IP).
 
Policies, Procedures, and PKI  29 November 2004 
Source: "Policies, Procedures, and PKI" - Posted by Administrator   
Excerpted from Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure by Russ Housley and Tim Polk. John Wiley & Sons 2001.
 
<< Start < Prev 1 2 3 Next > End >>

Results 1 - 10 of 28
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Infosec geniuses hack a Canon PRINTER and install DOOM
How network virtualization is used as a security tool
Here's What Hackers Can Do With Your CRM Data
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.