Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Cleaning up a Debian GNU/Linux system

Debian

Fight Image Spam With FuzzyOCR And SpamAssassin On Debian Lenny

Post date: April 29, 2010, 14:04 Category: Installing Views: 3423 Comments
Tutorial quote: This tutorial describes how to scan emails for image spam with FuzzyOCR on a Debian Lenny server. FuzzyOCR is a plugin for SpamAssassin which is aimed at unsolicited bulk mail containing images as the main content carrier. Using different methods, it analyzes the content and properties of images to distinguish between normal mails (ham) and spam mails. FuzzyOCR tries to keep the system load low by scanning only mails that have not already been categorized as spam by SpamAssassin, thus avoiding unnecessary work.
Debian

Preventing Brute Force Attacks With BlockHosts On Debian Etch

Post date: September 30, 2007, 09:09 Category: Security Views: 4782 Comments
Tutorial quote: In this article I will show how to install and configure BlockHosts on a Debian Etch system. BlockHosts is a Python tool that observes login attempts to various services, e.g. SSH, FTP, etc., and if it finds failed login attempts again and again from the same IP address or host, it stops further login attempts from that IP address/host. By default, BlockHosts supports services that use TCP_WRAPPERS, such as SSH, i.e. services, that use /etc/hosts.allow or /etc/hosts.deny, but it can also block other services using iproute or iptables.
Debian

Restricting Users To SFTP Plus Setting Up Chrooted SSH/SFTP (Debian Squeeze)

Post date: September 6, 2011, 07:09 Category: Miscellaneous Views: 6595 Comments
Tutorial quote: This tutorial describes how to give users chrooted SSH and/or chrooted SFTP access on Debian Squeeze. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of. I will also show how to restrict users to SFTP so that they cannot use SSH (this part is independent from the chroot part of this tutorial).
Linux

Linux Security HOWTO

Post date: April 12, 2005, 17:04 Category: Security Views: 3531 Comments
Tutorial quote: This document is a general overview of security issues that face the administrator of Linux systems. It covers general security philosophy and a number of specific examples of how to better secure your Linux system from intruders. Also included are pointers to security-related material and programs.
Debian

Using the 'snort' Intrusion Detection System

Post date: December 27, 2005, 15:12 Category: Security Views: 5446 Comments
Tutorial quote: Snort is the leading open source Network Intrusion Detection System and is a valuable addition to the security framework at any site. Even if you are employing lots of preventative measures, such as firewalling, patching, etc., a detection system can give you an assurance that your defences truly are effective, or if not, will give you valuable information about what you need to improve.

Fortunately, there is a good set of snort packages for Debian which takes a lot of the tedious work out of building a useful Network Intrusion Detection System. Before we start on installation, we should review a few details about the networking satack that you're going to need to make sense of the alerts snort will generate. Impatient readers and those who are familiar with the TCP/IP suite of protocols may do now skip to the bit that says Stand alone snort.
Linux

Slim Down and Speed Up Linux

Post date: December 17, 2007, 06:12 Category: Optimizing Views: 7963 Comments
Tutorial quote: While Linux is pretty efficient with a computer's resources out of the box, there are still ways you can make it run leaner and meaner on your desktop. Using a little bit of know-how, a willingness to run a few terminal commands and a mind for efficiency, you can get every last bit of power from your Linux box, or get more life from an older system. Read on for a roundup of ways to slim down and speed up Linux that any level of user can implement.
Debian

How To Create A Local Debian/Ubuntu Mirror With apt-mirror

Post date: January 4, 2007, 20:01 Category: Miscellaneous Views: 4057 Comments
Tutorial quote: This tutorial shows how to create a Debian/Ubuntu mirror for your local network with the tool apt-mirror. Having a local Debian/Ubuntu mirror is good if you have to install multiple systems in your local network because then all needed packages can be downloaded over the fast LAN connection, thus saving your internet bandwidth.
Ubuntu

Ubuntu Customization Guide v2

Post date: November 26, 2007, 05:11 Category: Desktop Views: 6464 Comments
Tutorial quote: Today with a hike in Linux acceptance its pretty hard for competitors to provide similar solutions at free of cost. Open Source is known for User Interaction with Operating System which cannot be done with other OS. Linux user can customize, create, edit, add files according to his/her taste..and customization is the part where Linux is one step ahead of every OS.
Linux

Boot Linux Over HTTP With boot.kernel.org (BKO)

Post date: September 27, 2009, 09:09 Category: Miscellaneous Views: 4401 Comments
Tutorial quote: This tutorial shows how you can boot Linux over HTTP with boot.kernel.org (BKO). All that users need is Internet connectivity and a small program (gpxe) to boot the machine. This gpxe program provides network booting facility. BKO allows you to boot into the following distributions: Debian, Ubuntu, Damn Small Linux, Knoppix, Fedora. BKO provides gpxe images for USB sticks, CDs, and also for floppies, i.e., you can boot from a USB sticks, a CD, or a floppy.
Linux

How to catch Linux system intruders

Post date: September 22, 2008, 13:09 Category: Security Views: 4953 Comments
Tutorial quote: Secure your Linux box by locking it down and posting a guard to watch for intruders.
Web-based applications and online marketing solutions - LumoLink