Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for NIST Publically-Released Fedora/Red Hat Core Security Guide

Unix+clones

Security Testing your Apache Configuration with Nikto

Post date: August 29, 2006, 16:08 Category: Security Views: 4491 Comments
Tutorial quote: By now you've got the perfect setup for your new Ubuntu 6.0.6 (Dapper Drake) box. You may have even followed the excellent Intrusion Detection and Prevention with BASE and Snort tutorial. And as an added precaution you installed DenyHosts to prevent hack attempts via ssh. But now that you've got your new LAMP server on the internet, how can you tell that your new web server is secure? You test it, of course!
Ubuntu

Upgrade Ubuntu 9.04 (Jaunty Jackalope) to Ubuntu 9.10 (Karmic Koala) Beta

Post date: October 12, 2009, 10:10 Category: System Views: 5934 Comments
Tutorial quote: The Ubuntu developers are moving quickly to bring you the latest and greatest software the Open Source Community has to offer. This is the Ubuntu 9.10 beta release, which brings a host of exciting new features.

Note: This is a beta release. Do not install it on production machines. The final stable version will be released on October 29th, 2009.
OpenSUSE

Grisbi Personal Finance Manager in openSUSE

Post date: April 1, 2009, 21:04 Category: Software Views: 3889 Comments
Tutorial quote: Grisbi is a freee opensource personal accounting software for Linux and Windows released under GPL. Grisbi is a simple and intuitive software for basic use, and still very powerful once setup. Grisbi can manage multiple accounts, currencies and users and manages third party, expenditure and receipt categories, as well as budgetary lines, financial years, and other informations that makes it quite adapted for associations
Linux

Kernel parameters for enhance security

Post date: October 28, 2008, 05:10 Category: Security Views: 4019 Comments
Tutorial quote: The following list shows tunable kernel parameters you can use to secure your Linux server against attacks.

For each tunable kernel parameters you need to be add it to the /etc/sysctl.conf configuration file to make the change permanent after reboots
Solaris

Enforcing a Two Man Rule Using Solaris 10 RBAC

Post date: April 28, 2005, 02:04 Category: Security Views: 5426 Comments
Tutorial quote: The "two man rule" (also sometimes called the "four eyes rule") has its origins in military protocol although for quite some time it has been welcomed into the stockpile of IT security controls used by organizations around the world. The "two man rule" specifies that there must be two individuals that must act in concert in order to perform some action.
Fedora+Core

How To Install A Custom Iptables Firewall

Post date: March 31, 2006, 21:03 Category: Network Views: 5185 Comments
Tutorial quote: This guide is to show you how to edit your iptables if you're running on a server This guide info came from iptables rocks, but i edited a bunch of data to make it suitable for what i want it to do.
Linux

How to Avoid Getting Blacklisted

Post date: July 7, 2007, 23:07 Category: Security Views: 4478 Comments
Tutorial quote: A blacklist usually refers to a list of email or IP addresses known to send spam emails or some other type of unsolicited messages. Such lists are currently used by mail servers for filtering incoming emails and blocking the ones listed, in order to improve mail security and integrity. The blacklist is also the opposite of what is called a whitelist.
Debian

Installing ASSP (Anti-Spam SMTP Proxy) On Ubuntu Server 10.04 / Debian 5.0

Post date: March 15, 2011, 12:03 Category: Installing Views: 4360 Comments
Tutorial quote: This How-To document guides you through installing ASSP (Anti-Spam SMTP Proxy) on an Ubuntu 10.04 (LTS) Server or Debian 5.0 in the simplest way possible. It *may* work on later versions but I have no way of knowing how these instructions will work for you. Installing Ubuntu/Debian is beyond the scope of this document and it is assumed you already have the core Ubuntu/Debian OS with no predefined software collections installed.
Fedora+Core

Tripwire on your Fedora Box

Post date: April 16, 2005, 00:04 Category: Security Views: 5719 Comments
Tutorial quote: Tripwire is an Intrusion Detection System. This can be used to alert users whenever their system is compromised. Tripwire detects and reports changes in system files. It will alert you through email whenever a change is detected. If the change is due to normal system activity, you can instruct Tripwire not to report the change to that file in future. If the change is not due to normal system activity, then it is a clear indication that something is wrong and you need to act immediately and fix the issue. Thus tripwire comes very handy to maintain the integrity of the system.

There is lot of information on the web about Tripwire. Some people might argue that AIDE (Advanced Intrusion Detection Environment) is better than tripwire and so on. This comparison is beyond the scope of this article. This is an introductory article for novice users who are interested in installing Tripwire on their Fedora Box. Advanced users can refer to the web for relevant information or they can contact appropriate mailing lists like fedora users mailing list.
Fedora

Enabling Compiz Fusion On A Fedora 8 GNOME Desktop (ATI Mobility Radeon 9200)

Post date: November 15, 2007, 12:11 Category: Desktop Views: 4893 Comments
Tutorial quote: This tutorial shows how you can enable Compiz Fusion on a Fedora 8 GNOME desktop (the system must have a 3D-capable graphics card - I am using an ATI Mobility Radeon 9200 here). With Compiz Fusion you can use beautiful 3D effects like wobbly windows or a desktop cube on your desktop.
Web-based applications and online marketing solutions - LumoLink