Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Howto install the base Linux system onto a USB thumbdrive with the root partition encrypted

Unix+clones

How to scan your Linux-Distro for Root Kits

Post date: May 19, 2006, 18:05 Category: Security Views: 3179 Comments
Tutorial quote: Do you suspect that you have a compromised system ?
Check now for root kits that the intruder may have installed !!!

So... What in the hell is a root kit ???
A root kit is a collection of programs that intruders often install after they have compromised the root account of a system.
These programs will help the intruders clean up their tracks, as well as provide access back into the system.
Root kits will sometimes leave processes running so that the intruder can come back easily and without the system administrator's knowledge !

Solution....
Scripts like chkrootkit will do the job for you automatically.
Linux

/etc/grub.conf explained

Post date: September 28, 2008, 09:09 Category: Software Views: 3586 Comments
Tutorial quote: The following example shows the structure of a GRUB menu file. The example installation has a Linux boot partition under /dev/sda5, a root partition under /dev/sda7, and a Windows installation under /dev/sda1.
Linux

TrueCrypt Tutorial: Truly Portable Data Encryption

Post date: July 2, 2007, 23:07 Category: Security Views: 3486 Comments
Tutorial quote: TrueCrypt is a free software that encrypts data on-the-fly. Right now the newest version released is version 4.3. You can create an encrypted hard drive, a separate partition or a directory with TrueCrypt. It does not simply encrypt the content of files, but their names and the names of the directories they are in as well. Moreover there is no way to check the size of the encrypted directory/HDD/partition. TrueCrypt is available for Windows and Linux.
Ubuntu

Perfect Setup Of Snort + Base + PostgreSQL On Ubuntu 6.06 LTS

Post date: April 25, 2007, 21:04 Category: Installing Views: 3941 Comments
Tutorial quote: This tutorial describes how you can install and configure the Snort IDS (intrusion detection system) and BASE (Basic Analysis and Security Engine) on an Ubuntu 6.06 (Dapper Drake) system. With the help of Snort and BASE, you can monitor your system - with BASE you can perform analysis of intrusions that Snort has detected on your network. Snort will use a PostgreSQL database to store/log the data it gathers.
Debian

Installing Debian onto USB flash media with everything encrypted

Post date: September 28, 2005, 16:09 Category: Security Views: 6802 Comments
Tutorial quote: This is a simple procedure for installing Debian GNU/Linux onto a USB key flash media. It includes several configuration changes but tries to stay as close to a default debian install as possible.

This is useful for administrators that need to carry sensitive information or people concerned about their privacy.
Linux

USB Flash Memory HOWTO

Post date: April 16, 2005, 00:04 Category: Hardware Views: 3013 Comments
Tutorial quote: The purpose of this document is to describe procedures for implementing USB flash memory devices (memory sticks) on Linux.
Debian

How to set up an encrypted filesystem in several easy steps

Post date: December 10, 2006, 08:12 Category: Security Views: 3327 Comments
Tutorial quote: There's been a lot of talk lately about encrypted partitions, and Debian is proud to offer a feature to easily create them in the etch installer since beta3. But what about existing systems? This guide walks you through setting up an encrypted partition using cryptsetup and LUKS.
Debian

Upgrade Debian Lenny To Squeeze In A Few Simple Steps

Post date: February 8, 2011, 12:02 Category: Installing Views: 2325 Comments
Tutorial quote: One rather old laptop and one server were the test objects for this howto. Both systems do not have any RAID devices and use a simple partition scheme from a default basic Lenny install. If your setup deviates much from this, it's highly recommended to read all details of the Debian Release Notes before you continue. Be warned. All commands are run as root and Debian recommends to use apt-get for the Squeeze upgrade process.
Debian

Creating A Fully Encrypted Para-Virtualised Xen Guest System Using Debian Lenny

Post date: May 3, 2009, 10:05 Category: Miscellaneous Views: 3364 Comments
Tutorial quote: This document explains how to set up a fully encrypted para-virtualized XEN instance. In this howto, the host system is running Debian Etch, while the guest system to be installed will be using Debian Lenny. If you are concerned about your privacy, you might want to consider using hard disk encryption to protect your valuable private data from spying eyes. Usually, the easiest way would be to use your distribution's installer to set up a fully encrypted system; I think most recent Linux distributions support this. However, when you are using XEN to provide virtualization, there are situations where you might not want to encrypt your whole computer with all guest instances, but instead only encrypt one OS instance. This howto will deal with exactly this situation. It assumes that the XEN host system is already up and running.
Ubuntu

Howto install Cherokee web server with MySQL, PHP support on Jaunty

Post date: July 23, 2009, 21:07 Category: Software Views: 2544 Comments
Tutorial quote: Cherokee is a very fast, flexible and easy to configure Web Server. It supports the widespread technologies nowadays: FastCGI, SCGI, PHP, CGI, SSI, TLS and SSL encrypted connections, Virtual hosts, Authentication, on the
fly encoding, Load Balancing, Apache compatible log files, Data Base Balancing, Reverse HTTP Proxy, Traffic Shaper,
Video Streaming and much more.

Web-based applications and online marketing solutions - LumoLink