Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Security related tutorials

Debian

Preventing MySQL Injection Attacks With GreenSQL On Debian Etch

Post date: October 28, 2008, 12:10 Category: Security Views: 3548 Comments
Tutorial quote: GreenSQL (or greensql-fw) is a firewall for MySQL databases that filters SQL injection attacks. It works as a reverse proxy, i.e., it takes the SQL queries, checks them, passes them on to the MySQL database and delivers back the result from the MySQL database. It comes with a web interface (called greensql-console) so that you can manage GreenSQL through a web browser. This guide shows how you can install GreenSQL and its web interface on a Debian Etch server.
Linux

Kernel parameters for enhance security

Post date: October 28, 2008, 05:10 Category: Security Views: 2979 Comments
Tutorial quote: The following list shows tunable kernel parameters you can use to secure your Linux server against attacks.

For each tunable kernel parameters you need to be add it to the /etc/sysctl.conf configuration file to make the change permanent after reboots
Linux

Encrypt CD/DVDs

Post date: October 28, 2008, 05:10 Category: Security Views: 2698 Comments
Tutorial quote: This guide can be adapted to any distro, its not Ubuntu specific.
OpenSUSE

Protection from malware using Squid proxy server

Post date: September 28, 2008, 09:09 Category: Security Views: 4188 Comments
Tutorial quote: Malware (for "malicious software") is any program or file that is harmful to a computer user. Thus, malware includes computer viruses, worms, Trojan horses, and also spyware, programming that gathers information about a computer user without permission.
Linux

How to catch Linux system intruders

Post date: September 22, 2008, 13:09 Category: Security Views: 3953 Comments
Tutorial quote: Secure your Linux box by locking it down and posting a guard to watch for intruders.
Untangle

Spam Blocking And Web Filtering With The Untangle 5.3 Network Gateway

Post date: September 4, 2008, 10:09 Category: Security Views: 7157 Comments
Tutorial quote: Untangle bundles common open-source applications for blocking spam, spyware, viruses, adware and unwanted content on the network in one single Linux distribution. It can be integrated into existing networks either as a router or as a transparent bridge (directly behind the router, but before the switch that connects the client PCs with the router). The best thing about Untangle is that you do not have to reconfigure the client PCs - Untangle works out of the box.
OpenSUSE

OpenVAS - Opensource Vulnerability Assessment Scanner

Post date: August 24, 2008, 22:08 Category: Security Views: 9684 Comments
Tutorial quote: OpenVAS, Open Bulnerability Assessment Server is a free opensource vulnerability assessment software released under GNU GPL lincese. OpenVAS is a fork of Nessus Vulnerability assessment software. Similar to the Plugin sets in Nessus, OpenVAS provides free Network Vulnerability Tests plugins that can be updated regularly.
OpenSUSE

Nessus Vulnerability Scanner in openSUSE

Post date: August 23, 2008, 22:08 Category: Security Views: 3110 Comments
Tutorial quote: The Nessus vulnerability scanner, is the world-leader in active scanners, featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks. Nessus can also be used for ad-hoc scanning, daily scans, and quick-response audits.
OpenSUSE

TrueCrypt - Free opensource on the fly Disk Encryption tool

Post date: August 7, 2008, 22:08 Category: Security Views: 3174 Comments
Tutorial quote: TrueCrypt is a free opensource software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc).
Linux

How To Patch BIND9 Against DNS Cache Poisoning (Debian/Fedora/CentOS)

Post date: July 29, 2008, 09:07 Category: Security Views: 3391 Comments
Tutorial quote: Dan Kaminsky earlier this month announced a massive, multi-vendor issue with DNS that could allow attackers to compromise any name server - clients, too. These two articles explain how you can fix a BIND9 nameserver on Debian Etch and Fedora/CentOS so that it is not vulnerable anymore to DNS cache poisoning.

http://www.howtoforge.com/how-to-patch-bind-to-avoid-cache-poisoning-debian-etch
http://www.howtoforge.com/how-to-patch-bind-to-avoid-cache-poisoning-fedora-centos
Web-based applications and online marketing solutions - LumoLink