How To Harden My Filesystem - Page 3

Find the HOWTO or step-by-step guide that you need right here.

Discover How To Harden My Filesystem HOWTOs

Adding Modules to BackTrack In linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

BackTrack, the penetration testing distribution, is a great LIve-CD to test a system and tear it apart. This HOWTO: One of BackTracks' most appealing features is it's modularity. As an end user, you can add your own modules scripts and tools to the livecd.

Protecting Data with Encrypted Linux Partitions

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

All too often, you hear the story of how X number of laptops or social security numbers were stolen from company Y. And why is so little attention paid to how and why that information was left unprotected and so easily accessible? There are many ways to combat this problem. One of the best ways is with encryption. And Carla Schroder takes us through a great way Today let us focus on the issue of protecting sensitive data on hard drives with encrypted file systems. This is for your mobile users and anyone who needs extra data security on workstations and servers. We're going to use cryptsetup-luks because it is easy and it is strong. We will create an encrypted partition that requires a passphrase only at mount time. Then you can use it just like any other partition. Nice summary and easy to follow.

How to Secure Ubuntu With AppArmor

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

AppArmor is one way to protect your assets on your Ubuntu Gutsy system. AppArmor attempts to protect processes on the server or desktop from security threats. AppArmor enforces limits on what processes can access on the system. It attempts to restrict processes to those resources that the process requires to function only. If you wanted to give AppArmor a try, and SELinux isn't your flavor, get your start here.

Giving RSYNC a run for its money: Duplicity???

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

According to the Merriam-Webster online dictionary, duplicity is defined as "contradictory doubleness of thought, speech, or action." To the more Linux-initiated, however, it is an exceedingly useful tool. Make no mistakes about it, Duplicity is a very capable way of encrypting data and throwing its weight around against the standard Rsync. Read here to learn more about why duplicity is an alternative worth looking into.

Why Linux Threats Mean Business

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Linux-related security issues are an increasing threat to businesses. Discover a solution that protects complex networks with vital on-access scanning capabilities, automatic updating and intuitive management functions.

Cryptoloop HOWTO

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This document explains how to create encrypted file systems using the Cryptoloop functionality. Cryptoloop is part of the CryptoAPI in the 2.6 Linux kernel series.

Kerberos Infrastructure HOWTO

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This document describes the design and configuration of a Kerberos infrastructure for handling authentication with GNU/Linux. It details steps for a best practices method of setting up servers, Kerberos software, conversion of legacy systems, and ans

LDAP Linux HOWTO

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Information about installing, configuring, running and maintaining a LDAP (Lightweight Directory Access Protocol) Server on a Linux machine is presented on this document. The document also presents details about how to create LDAP databases, how to a

The Impact of Technology on Risk and Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Holistic Risk Management describes the impact of technology into the risk management world. More specifically it describes technologies effect on internal controls, process and policy in an organization when technology is introduced into areas such..

Why Is No One Hacking Linux Anymore?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

When this paper was first released, some readers confused this paper as a comparison between Windows and Linux. That is not the case. The purpose of this paper is to make you ask the question Why is no one hacking Linux anymore?

Securing Linux Production Systems

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This article is a practical step-by-step guide for securing Linux production systems. It shows how to meet basic security requirements for Linux systems that need to pass security audits. This guide also discusses some Linux security steps that canno