Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Linux Security HOWTO

Linux

Linux Security HOWTO

Post date: April 12, 2005, 17:04 Category: Security Views: 2832 Comments
Tutorial quote: This document is a general overview of security issues that face the administrator of Linux systems. It covers general security philosophy and a number of specific examples of how to better secure your Linux system from intruders. Also included are pointers to security-related material and programs.
Debian

Securing Debian Manual

Post date: January 1, 2008, 13:01 Category: Security Views: 3660 Comments
Tutorial quote: This document describes security in the Debian project and in the Debian operating system. Starting with the process of securing and hardening the default Debian GNU/Linux distribution installation, it also covers some of the common tasks to set up a secure network environment using Debian GNU/Linux, gives additional information on the security tools available and talks about how security is enforced in Debian by the security and audit team.
CentOS

Configuring Samba 3.0 To Use The ADS Security Mode (CentOS)

Post date: June 25, 2007, 23:06 Category: Installing Views: 4327 Comments
Tutorial quote: The intent of this article is to show you how to configure your Linux machine and Samba server to participate in a Windows 2003 Active Directory domain as a Member Server using Kerberos authentication. This involves using the security = ADS security mode in Samba.
Solaris

NIST Publically-Released Fedora/Red Hat Core Security Guide

Post date: October 21, 2006, 04:10 Category: Security Views: 6033 Comments
Tutorial quote: The Benchmark is a compilation of security configuration actions and settings that "harden" Red Hat Linux operating systems. It is a CIS Level-I benchmark: the prudent level of minimum due care for operating system security. This benchmark was developed and tested on Red Hat Enterprise Linux (RHEL) including RHEL 2.1, RHEL 3.0, and Fedora Core 1, 2, & 3. It is likely to work for other Linux distributions - especially Red Hat and Fedora derivatives - as well.
Linux

LDAP Authentication In Linux

Post date: August 26, 2006, 06:08 Category: Security Views: 5439 Comments
Tutorial quote: This howto will show you howto store your users in LDAP and authenticate some of the services against it. I will not show howto install particular packages, as it is distribution/system dependant. I will focus on "pure" configuration of all componenets needed to have LDAP authentication/storage of users. The howto assumes somehow, that you are migrating from a regular passwd/shadow authentication, but it is also suitable for people who do it from scratch.
Debian

Bind chroot howto

Post date: April 12, 2005, 17:04 Category: Security Views: 2580 Comments
Tutorial quote: This document describes how to install the DNS server Bind on Debian so that it runs out of a chroot jail for security reasons.
Linux

Connecting to a Wireless LAN with Linux, Part 2

Post date: April 13, 2005, 19:04 Category: Hardware Views: 3665 Comments
Tutorial quote: In Part 1 we reviewed hardware options, which wireless utilities should be present, how to use Windows drivers, and how to be open to connect to any available wireless access point. Today we'll cover configurations on Red Hat- and Debian-type systems, basic security, and hardware discovery.

Wireless connectivity can be rather overly friendly, allowing connections from anyone. This howto assumes you have a wireless access point on a LAN, which can be all wireless or mixed wired and wireless. You don't want it wide open to just any random person with a desire to snoop on your network or "borrow" your bandwidth, but you want some access controls and security. Your access point should have a unique SSID (service set identifier), WEP (wireless equivalent privacy) or WPA/WPA2 (Wi-fi protected access) set up and working, and either a DHCP server or a pool of assigned IP addresses for clients.
Unix+clones

Chkrootkit Portsentry Howto

Post date: April 15, 2005, 23:04 Category: Security Views: 2791 Comments
Tutorial quote: This document describes how to install chkrootkit and portsentry. It should work (maybe with slight changes concerning paths etc.) on all *nix operating systems.

Chkrootkit "is a tool to locally check for signs of a rootkit" (from http://www.chkrootkit.org).

"The Sentry tools provide host-level security services for the Unix platform. PortSentry, Logcheck/LogSentry, and HostSentry protect against portscans, automate log file auditing, and detect suspicious login activity on a continuous basis" (from http://sourceforge.net/projects/sentrytools/).

This howto is meant as a practical guide.
Linux

Enhancing kernel security with grsecurity

Post date: November 25, 2005, 21:11 Category: Security Views: 2853 Comments
Tutorial quote: Is your server as secure as it could be? Sure, you use a firewall, mandate strong passwords, and patch regularly. You even take a proactive approach by performing security audits with tools such as nmap and Nessus. Yet you may still be vulnerable to zero-day exploits and privilege escalation attacks. If these possibilities keep you awake at night, you're not alone. The sleepless folks with the grsecurity project have developed an easy-to-use set of security enhancements to help put your fears to rest.
Unix+clones

Enhance boot-time security with GRUB passwords

Post date: April 26, 2006, 13:04 Category: Security Views: 2967 Comments
Tutorial quote: The security of data files on your computer is at risk, and not just because you are connected to the Internet. Anyone with physical access to your machine can bypass all passwords to gain entry to your hard disk with one simple command given to the bootloader. Fortunately, the popular GRand Unified Bootloader (GRUB) is equipped with security features to prevent such an 'attack.' It can password protect each entry of your boot menu.
Web-based applications and online marketing solutions - LumoLink