Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Security related tutorials

FreeBSD

Update FreeBSD with freebsd-update

Post date: May 18, 2007, 01:05 Category: Security Views: 4177 Comments
Tutorial quote: Rather doing single patch for single case you can use freebsd-update to update security in single and convenient way.
Linux

Secure Websites Using SSL And Certificates

Post date: May 16, 2007, 22:05 Category: Security Views: 3565 Comments
Tutorial quote: This article will guide you through the entire process of setting up a secure website using SSL and digital certificates. This guide assumes that you already have a fully functional (and configured) server running Apache, BIND, and OpenSSL. Just as a side note, this guide was written based on a Fedora Core 6 distribution, but should be the same for most other distros out there.
Debian

Preventing Brute Force Attacks With Fail2ban On Debian Etch

Post date: May 1, 2007, 21:05 Category: Security Views: 4212 Comments
Tutorial quote: In this article I will show how to install and configure fail2ban on a Debian Etch system. Fail2ban is a tool that observes login attempts to various services, e.g. SSH, FTP, SMTP, Apache, etc., and if it finds failed login attempts again and again from the same IP address or host, fail2ban stops further login attempts from that IP address/host by blocking it with an iptables firewall rule.
Ubuntu

Snare and Splunk…full logging for everyone (Logs, manage them well on Ubuntu)

Post date: April 10, 2007, 05:04 Category: Security Views: 5292 Comments
Tutorial quote: How to set up splunk on a Ubuntu server and centralize all your logging needs with a very powerfull search engine...very nifty stuff.
Unix+clones

Sudo FAQ

Post date: February 26, 2007, 21:02 Category: Security Views: 4215 Comments
Tutorial quote: Sudo is a simple program which allows the administrator to give regular users extra permissions to execute the commands they would normally not be allowed to use. Thanks to sudo, we can execute commands that are usually restricted to the root account. In practice, it looks like that: instead of typing su ->password -> command you type sudo command. In order to use sudo you need to configure it properly. This FAQ is supposed to help you with this task.
Linux

Automatically Scan Uploaded Files For Viruses With php-clamavlib

Post date: January 14, 2007, 21:01 Category: Security Views: 4251 Comments
Tutorial quote: This guide describes how you can automatically scan files uploaded by users through a web form on your server using PHP and ClamAV. That way you can make sure that your upload form will not be abused to distribute malware. To glue PHP and ClamAV, we install the package php5-clamavlib/php4-clamavlib which is rather undocumented at this time. That package is available for Debian Etch and Sid and also for Ubuntu Dapper Drake and Edgy Eft.
Fedora+Core

IPTABLES Explained Part 4: IPTables and Portsentry, the dynamic duo

Post date: January 3, 2007, 10:01 Category: Security Views: 8256 Comments
Tutorial quote: A tutorial that explains on how to make Portsentry and IPTables to work smoothly together on Fedora. This includes the dynamic adding AND the periodic removal of "old" IPs as well as saving your blocked IP lists in case you need to change your IPTables script or reboot.
Linux

Tunneling MySQL connections through SSH

Post date: January 2, 2007, 20:01 Category: Security Views: 3438 Comments
Tutorial quote: This is a description of how to set up a secure tunnel between your MySQL Server and a locally running MySQL Administrator using Putty. By creating a secure tunnel to your MySQL server using Putty, you can grant localhost access to powerful applications like MySQL Administrator while at the same time, make your server appear as if it isn't even there. In effect, make your MySQL server disappear from the outside world.
Unix+clones

Building a cheap secure wireless (WLAN) infrastructure with OpenVPN and Linux

Post date: January 2, 2007, 19:01 Category: Security Views: 4052 Comments
Tutorial quote: WEP is insecure and having different WPA authentications at different Access Points can be a pain. Why not centralize all your meeting rooms with OpenVPN to a central server? This tutorial gets you up to speed.
Linux

Key-Based SSH Logins With PuTTY

Post date: December 10, 2006, 20:12 Category: Security Views: 3464 Comments
Tutorial quote: This guide describes how to generate and use a private/public key pair to log in to a remote system with SSH using PuTTY. PuTTY is an SSH client that is available for Windows and Linux (although it is more common on Windows systems). Using key-based SSH logins, you can disable the normal username/password login procedure which means that only people with a valid private/public key pair can log in. That way, there is no way for brute-force attacks to be successful, so your system is more secure.
Web-based applications and online marketing solutions - LumoLink