Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for How To Secure An SSL VPN With One-Time Passcodes And Mutual Authentication

Linux

How To Secure An SSL VPN With One-Time Passcodes And Mutual Authentication

Post date: June 30, 2007, 23:06 Category: Security Views: 3403 Comments
Tutorial quote: SSL-based VPNs were designed to eliminate the need for complex configurations on the user's PC. Unfortunately, that was before the dangers of public WiFi networks and tougher regulatory requirements came into being. Thanks to WiFi, many attacks that were difficult are now quite simple. In particular, a man-in-the-middle attack can intercept SSL-encrypted traffic, rendering SSL-based VPNs useless - even if it is protected by a typical one-time password system. The man-in-the-middle can easily feed the one-time password into the SSL-based VPN within the alloted time.
OpenSolaris

Installing and Configuring OpenVPN in OpenSolaris

Post date: December 20, 2009, 16:12 Category: Software Views: 4419 Comments
Tutorial quote: Learn to install and configure the free OpenVPN software package under OpenSolaris. OpenVPN is an opensource VPN solution using SSL for encryption and certificate authentication. The tutorial teaches how to install & configure OpenVPN and create certificates for authentication.
Linux

Setting Up Subversion for One or Multiple Projects

Post date: April 13, 2005, 00:04 Category: Miscellaneous Views: 3934 Comments
Tutorial quote: Deploying a secure and manageable Subversion installation that uses Apache 2.0 as a central authentication checkpoint and SSL for data integrity and confidentiality.
Linux

How to secure VNC remote access with two-factor authentication

Post date: May 21, 2007, 22:05 Category: Security Views: 3212 Comments
Tutorial quote: VNC is the most popular remote access solution today. However, it was developed to provide remote access, not to provide secure remote access. Administrators have to add security to VNC by tunneling it through an encrpyted channel such as SSH and adding a layer of authentication. In this article, we will show you how to combine the NoMachine NX server to encrpyt VNC and remote X session combined with two-factor authentication from WiKID Systems to create a secure, fast remote access solution.
Ubuntu

Anonymous BitTorrent Using ItsHidden VPN

Post date: July 28, 2009, 18:07 Category: Benchmarks Views: 4053 Comments
Tutorial quote: With anti-piracy outfits warning those who share copyrighted content and ISPs threatening to pull the plug on alleged offenders, many file-sharers have decided to protect themselves by going anonymous. To accommodate this growing demand, ItsHidden is now offering a free VPN targeted at those who want to protect their privacy online. Named ItsHidden, the free VPN solution has opened up a BETA test to the public, who can now privatize their Internet traffic - including BitTorrent transfers - in next to no time. ItsHidden was set up with torrent users in mind, allowing them to hide their identities from ‘third parties’ who choose to snoop on their activities.
IPCop

Setup your own VPN with IPCop and OpenVPN

Post date: March 30, 2006, 17:03 Category: Network Views: 9713 Comments
Tutorial quote: I ’m a huge fan of IPCop. It’s a great firewall distro that makes administration a snap using a slick web interface. My goal was to use IPCop and an easy-to-use VPN client to allow access to my LAN while away from home.

I ended up going with the ZERINA OpenVPN addon for IPCop and the OpenVPN GUI for Windows.

If you’ve ever wanted full, secure, encrypted access to your LAN from any remote location, here is your guide.

Just follow these ten easy steps…
Unix+clones

Using Public Key Authentication with SSH

Post date: June 26, 2008, 10:06 Category: Network Views: 4696 Comments
Tutorial quote: The current leading SSH server, OpenSSH, offers two main methods of authentication: interactive password and public key authentication. While interactive password authentication is the default, there are several reasons for using public key authentication. After reading some background information about public key cryptography, you should have a firm understanding of what public key cryptography is and how it works. You're welcome to skip straight to generating keys for use with SSH. Setting up public key authentication will require a few minutes, but the results are worthwhile.
OpenBSD

Creating secure wireless access points with OpenBSD and OpenVPN

Post date: December 13, 2005, 18:12 Category: Network Views: 7888 Comments
Tutorial quote: You know how insecure 802.11x wireless networks are. In this article we'll create an OpenBSD-based secure wireless access point that prevents unauthorized access and encrypts every packet using a VPN tunnel. OpenBSD is one of the most secure operating systems available, is easy to use, and includes almost everything you need for this project in the base installation.
Debian

sshpass - Non-interactive ssh password authentication

Post date: May 4, 2008, 22:05 Category: Security Views: 5695 Comments
Tutorial quote: SSH’s (secure shell) most common authentication mode is called “interactive keyboard password authentication”, so called both because it is typically done via keyboard, and because openssh takes active measures to make sure that the password is, indeed, typed interactively by the keyboard.

Sometimes, however, it is necessary to fool ssh into accepting an interactive password non-interactively. This is where sshpass comes in.
Linux

Secure Websites Using SSL And Certificates

Post date: May 16, 2007, 22:05 Category: Security Views: 3556 Comments
Tutorial quote: This article will guide you through the entire process of setting up a secure website using SSL and digital certificates. This guide assumes that you already have a fully functional (and configured) server running Apache, BIND, and OpenSSL. Just as a side note, this guide was written based on a Fedora Core 6 distribution, but should be the same for most other distros out there.
Web-based applications and online marketing solutions - LumoLink