LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: August 1st, 2014
Linux Security Week: July 28th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Documentation
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



How to configure OpenVPN to use WiKID Strong Authentication  04 January 2007 
Source: HOWTo Forge - Posted by Eric Lubow   
These instructions describe setting up two-factor authentication with WiKID Strong Authentication, which is a commercial/open source two-factor authentication system and OpenVPN, an SSL-encrypted VPN, on a Linux server using the Radius Pluggable Authentication Module.. First, we will configure PAM to use Radius, then we will configure OpenVPN to use PAM and one-time passwords, then we will create a network client on the WiKID server for OpenVPN. We won't go into specifics about installing these services, rather we will focus on configuring them to all work together.

 
Book: Forensic Discovery  20 December 2006 
Source: Porcupine.org - Posted by Benjamin D. Thomas   
In the spirit of our past work, our commitment to science and research, and our desire to help others we have also decided to put the text of the book online for free. Addison-Wesley was also kind enough to permit us to put up our final HTML drafts that we sent to the publisher; minus the final formatting and a few minor changes these should be very close to the book version and is suitable for printing, grep'ing, and the like. We will put up the final PDF version in the future as well.

We hope you find this useful; in addition to current owners all of this might be useful for those who cannot afford the printed version, would like to check it out without taking the fiscal plunge, or are just cheap.

 
Information Security as a Business Practice  11 December 2006 
Source: Info Sec Writers - Posted by Eric Lubow   
This article addresses the role information security plays in an organization. Historically, organizations have deemed information security to be an information technology issue, one that the business as a whole did not need to address. Organizations have also treated information security as an add-on feature, almost an afterthought. Information security must become ingrained into the culture of the organization to ensure security compliance in all facets of the company. Organizations that are beginning to mature with information security may choose to investigate and implement established systems that support information systems.

 
Set Up Ubuntu-Server 6.06 LTS As A Firewall/Gateway For Your Small Business Environment  10 December 2006 
Source: HOWTO Forge - Posted by Eric Lubow   
Needs very little maintenance and is extendable beyond your wildest imagination. All depending on the hardware used, of course. This is just a COPY&PASTE howto. For more info use the net. I did... However, contributions and suggestions are allways welcome! I know this can be done better, so feel free. I should have based this tuto on 6.06 LTS right away, because of the LTS. Sorry for that. Due to some minor but important changes needed to make this work with Ubuntu 6.06 LTS, I wrote it again.

 
Key-Based SSH Logins With PuTTY  08 December 2006 
Source: HOWTO Forge - Posted by Eric Lubow   
This guide describes how to generate and use a private/public key pair to log in to a remote system with SSH using PuTTY. PuTTY is an SSH client that is available for Windows and Linux (although it is more common on Windows systems). Using key-based SSH logins, you can disable the normal username/password login procedure which means that only people with a valid private/public key pair can log in. That way, there is no way for brute-force attacks to be successful, so your system is more secure.

 
Book Review: Security Threat Mitigation and Response  24 November 2006 
Source: UnixReview - Posted by Benjamin D. Thomas   
When it comes to network security, Cisco is actively involved in coming up with some of the very best solutions to troublesome problems that unexpectedly occur. When it comes to books about security, however, Cisco Press has an uneven batting average. Some of the books are good, while others leave you wondering how they made it through the editing stage. Looking at words like “paradigm” on the back cover of this title, my spine began to get a familiar tingle, but in this case, I am happy to report, they have hit a home run.

Cisco Security MARS (Monitoring, Analysis, and Response System) is a product intended to work with your network and identify (as well as prevent) problems early on. It is also intended to boost data privacy to the point where compliance becomes a certainty. Given the customization that is possible and the importance of getting it right, a book on the topic that is detailed and easy to read is almost a necessity.

 
Racoon Roadwarrior Configuration  13 November 2006 
Source: HOWTO Forge - Posted by Eric Lubow   
Roadwarrior is a client that uses unknown, dynamically assigned IP addresses to connect to a VPN gateway (in this case also firewall). This situation is shown on picture 1.1 and is one of the most interesting and today most needed scenarios in business environment. Here are some of the reasons why that is so: Client can be any computer (with any IP address assigned) that has Internet access and can initiate connection to VPN gateway. Wen connecting to VPN network, client is assigned an internal IP address on the network he is connecting to, which gives an impression that it is directly connected to VPN network, instead of connecting by tunneling through Internet. When internal IP address is assigned, network administration is easier. Traffic is protected on the route from the client to the VPN gateway. When connected, client doesn't have direct access to Internet because traffic is routed through VPN network and firewall (VPN gateway).

 
Enhance Your Mail Server With ASSP (Anti-Spam SMTP Proxy)  10 November 2006 
Source: HOWTO Forge - Posted by Eric Lubow   
"The ASSP server project is an Open Source platform-independent transparent SMTP proxy server that leverages numerous methodologies and technologies to both rigidly and adaptively identify spam. This web site's domain name, "ASSPSMTP", is the common name used for the daemon or service running ASSP." In short ASSP is the most kickass solution that is both free and works great. It reduced spam to an absurd minimum for me. The current solutions (Spamassassin,Razor,Pyzor,Dcc) were not enough for my situation. This software works from the port 25 on a system. and stop spam where it enters your system.

 
Malicious Code Injection: It’s Not Just for SQL Anymore  03 November 2006 
Source: Info Sec Writers - Posted by Eric Lubow   
More and more, developers are becoming aware of the threats posed by malicious code, and SQL injection in particular, and by leaving code vulnerable to such attacks. However, while SQL is the most popular type of code injection attack, there are several others that can be just as dangerous to your applications and your data, including LDAP injection and XPath injection. While these may not be as well-known to developers, they are already in the hands of hackers, and they should be of concern.

 
Penetration Test Framework UPDATE  10 October 2006 
Source: Info Sec Writers - Posted by Eric Lubow   
Lee Lawson submits this work on an excellent Penetration Test structure. This is a must for anyone performing penetration testing!!!

 
<< Start < Prev 1 2 3 Next > End >>

Results 11 - 20 of 444
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Attackers can easily create dangerous file-encrypting malware, new threat suggests
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.