Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Hack Attack: Top 10 Ubuntu apps and tweaks

Gentoo

VHCS2 on Gentoo HowTo

Post date: April 20, 2005, 13:04 Category: Installing Views: 4160 Comments
Tutorial quote: Want to build web hosting service on top of Gentoo? Well now you can with VHCS2 (Virtual Hosting Control System).
Linux

Using iptables to rate-limit incoming connections

Post date: December 16, 2005, 22:12 Category: Network Views: 3484 Comments
Tutorial quote: There are times when you have to allow arbitary incoming connections, when you are travelling for example.

In these situations you can open up your system to allow incoming connections and be the target of a dictionary attack - literally a machine trying to connect and login over and over again using usernames and passwords from a dictionary.

In this situation you can create a collection of firewalling rules which will deny access from remote clients who attempt to connect "too many" times.
Unix+clones

Enhance boot-time security with GRUB passwords

Post date: April 26, 2006, 13:04 Category: Security Views: 2984 Comments
Tutorial quote: The security of data files on your computer is at risk, and not just because you are connected to the Internet. Anyone with physical access to your machine can bypass all passwords to gain entry to your hard disk with one simple command given to the bootloader. Fortunately, the popular GRand Unified Bootloader (GRUB) is equipped with security features to prevent such an 'attack.' It can password protect each entry of your boot menu.
Gentoo

GCC extension for protecting from stack-smashing attacks

Post date: April 20, 2005, 10:04 Category: Security Views: 3079 Comments
Tutorial quote: The Stack-Smashing Protector (SSP, formerly ProPolice) is perhaps one of the most sophisticated yet simplistic protective compiler technologies to date which makes use of canary values by rearranging local variables and function pointers. When (ssp) is enabled it can prevent many forms of the common return-to-libc attack. It is implemented as a patch to GCC which will automatically insert protection code into your programs at compile time. It is developed by Hiroaki Etoh at IBM.
OpenSUSE

Qps Visual Process manager (X11 ps) in openSUSE

Post date: January 21, 2009, 07:01 Category: Software Views: 2964 Comments
Tutorial quote: Qps Visual Process Manager is an X11 version of “top” or “ps” that displays processes in a window and lets you sort and manipulate them. It displays some general system information, and many details about current processes (such as the TCP/UDP sockets in use by a process). Qps runs on Linux and Solaris.
Unix+clones

Squeeze Your Gigabit NIC for Top Performance

Post date: June 25, 2005, 01:06 Category: Optimizing Views: 4223 Comments
Tutorial quote: Many new workstations and servers are coming with integrated gigabit network cards, but quite a few people soon discover that they can't transfer data much faster than they did with 100 Mb/s network cards. Multiple factors can affect your ability to transfer at higher speeds, and most of them revolve around operating system settings. In this article we will discuss the necessary steps to make your new gigabit-enabled server obtain close to gigabit speeds in Linux, FreeBSD, and Windows.
Linux

Delete Qmail Server messages Queue

Post date: January 12, 2007, 18:01 Category: Software Views: 2729 Comments
Tutorial quote: qmail is a mail transfer agent that runs on Unix. It was more secure replacement for the popular Sendmail program. The author offered a $500 prize for the first person to publish a verifiable security hole in the latest version of the software.

This is a useful thing to do in a number of situations. For instance, if you are hit with a spamming attack, you can temporarily instate a second Qmail installation (once the spam run is finished), allow it to take over mail receipt,and then use this tool to clean the offending mails out of the queue before switching over to the main Qmail installation once again.
Linux

How To Secure An SSL VPN With One-Time Passcodes And Mutual Authentication

Post date: June 30, 2007, 23:06 Category: Security Views: 3426 Comments
Tutorial quote: SSL-based VPNs were designed to eliminate the need for complex configurations on the user's PC. Unfortunately, that was before the dangers of public WiFi networks and tougher regulatory requirements came into being. Thanks to WiFi, many attacks that were difficult are now quite simple. In particular, a man-in-the-middle attack can intercept SSL-encrypted traffic, rendering SSL-based VPNs useless - even if it is protected by a typical one-time password system. The man-in-the-middle can easily feed the one-time password into the SSL-based VPN within the alloted time.
OpenSUSE

Conky - Lightweight system monitor in openSUSE

Post date: May 11, 2009, 22:05 Category: System Views: 5392 Comments
Tutorial quote: Conky is a free, light-weight system monitor for X, that displays any information on your desktop. Conky is licensed under the GPL and runs on Linux and BSD. Conky has more than 250 built in objects, including support for a plethora of OS stats (uname, uptime, CPU usage, mem usage, disk usage, “top” like process stats, and network monitoring, built in support for IMAP and POP3 and many popular music players (MPD, XMMS2, BMPx, Audacious).
Debian

dmcrypt

Post date: January 25, 2006, 22:01 Category: Security Views: 4322 Comments
Tutorial quote: Device-mapper is a new infrastructure in the Linux 2.6 kernel that provides a generic way to create virtual layers of block devices that can do different things on top of real block devices like striping, concatenation, mirroring, snapshotting, etc... The device-mapper is used by the LVM2 and EVMS 2.x tools. dm-crypt is such a device-mapper target that provides transparent encryption of block devices using the new Linux 2.6 cryptoapi. Writes to this device will be encrypted and reads decrypted. You can mount your filesystem on it as usual. But without the key you can't access your data. It does basically the same as cryptoloop only that it's a much cleaner code and better suits the need of a block device and has a more flexible configuration interface. The on-disk format is also compatible.
Web-based applications and online marketing solutions - LumoLink