Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for A couple of tricks with the secure shell

Debian

Setting up an SSL server with Apache2

Post date: February 12, 2006, 07:02 Category: Network Views: 4407 Comments
Tutorial quote: With the introduction of the Apache2 packages in Debian it is much simpler to create and use a secure SSL protected webserver than in the old days with Apache 1.3, here we'll show how it is done.
Unix+clones

Building a cheap secure wireless (WLAN) infrastructure with OpenVPN and Linux

Post date: January 2, 2007, 19:01 Category: Security Views: 4073 Comments
Tutorial quote: WEP is insecure and having different WPA authentications at different Access Points can be a pain. Why not centralize all your meeting rooms with OpenVPN to a central server? This tutorial gets you up to speed.
Debian

Secure Debian System Using FireHOL Firewall

Post date: July 26, 2006, 20:07 Category: Desktop Views: 2937 Comments
Tutorial quote: FireHOL is a stateful iptables packet filtering firewall configurator. It is abstracted, extensible, easy and powerful. It can handle any kind of firewall, but most importantly, it gives you the means to configure it, the same way you think of it.
Fedora

The Perfect Desktop - Fedora 9

Post date: May 18, 2008, 09:05 Category: Desktop Views: 3890 Comments
Tutorial quote: This document describes step-by-step how to set up a Fedora 9 desktop (GNOME). The result is a fast, secure and extendable system that provides all you need for daily work and entertainment.
Linux

Secure your Server with iptables

Post date: April 20, 2005, 11:04 Category: Security Views: 3114 Comments
Tutorial quote: Central to securing a Linux server that's connected to the Internet is having a good firewall and specific policies in place. Numerous options exist for those considering firewalls for Linux, however, a free and included solution is onoffer through Netfilter and iptables.
Ubuntu

The Perfect Desktop - Ubuntu 7.10 (Gutsy Gibbon)

Post date: October 23, 2007, 07:10 Category: Desktop Views: 3923 Comments
Tutorial quote: This document describes how to set up an Ubuntu 7.10 (Gutsy Gibbon) desktop. The result is a fast, secure and extendable system that provides all you need for daily work and entertainment. About 23.000 packages are available in the repositories.
Unix+clones

Security Testing your Apache Configuration with Nikto

Post date: August 29, 2006, 16:08 Category: Security Views: 3586 Comments
Tutorial quote: By now you've got the perfect setup for your new Ubuntu 6.0.6 (Dapper Drake) box. You may have even followed the excellent Intrusion Detection and Prevention with BASE and Snort tutorial. And as an added precaution you installed DenyHosts to prevent hack attempts via ssh. But now that you've got your new LAMP server on the internet, how can you tell that your new web server is secure? You test it, of course!
Unix+clones

Unattended rdiff-backup HOWTO

Post date: April 3, 2006, 08:04 Category: Software Views: 4010 Comments
Tutorial quote: This page describes how to set up rdiff-backup to run, as a non-root user, unattended from a crontab. We will utilize features of rdiff-backup and OpenSSH to secure the setup as much as possible.
Ubuntu

Simple Chat Server with Netcat

Post date: December 1, 2007, 17:12 Category: Network Views: 4353 Comments
Tutorial quote: Ever use MSN instant messenger or Google Talk and feel like you are being watched? Well I have a little secret for you; you are being watched. Not that there is anything to hide, but privacy is always a good thing.
By using netcat we can setup a secure chat server, and it only takes about 5 minutes.
Unix+clones

Bypass any Firewall or Throttling ISP with SSH

Post date: October 22, 2007, 06:10 Category: Network Views: 4525 Comments
Tutorial quote: On some networks it’s impossible to use BitTorrent. For example, if you’re at work, school, or connected to Comcast or a public hotspot. But there’s an easy solution to overcome this problem. By using a secure connection (SSH), you can bypass almost every firewall or traffic shaping application.
Web-based applications and online marketing solutions - LumoLink