Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Security related tutorials

Debian

How to set up an encrypted filesystem in several easy steps

Post date: December 10, 2006, 08:12 Category: Security Views: 3374 Comments
Tutorial quote: There's been a lot of talk lately about encrypted partitions, and Debian is proud to offer a feature to easily create them in the etch installer since beta3. But what about existing systems? This guide walks you through setting up an encrypted partition using cryptsetup and LUKS.
Linux

Postfix with dkfilter (DomainKeys Implementation)

Post date: December 7, 2006, 21:12 Category: Security Views: 4061 Comments
Tutorial quote: DomainKeys is an anti-spam software application in development at Yahoo that uses a form of public key cryptography to authenticate the sender's domain. dkfilter is an SMTP-proxy designed for Postfix. It implements DomainKeys message signing and verification. It comprises two separate filters, an outbound filter for signing outgoing email on port 587, and an inbound filter for verifying signatures of incoming email on port 25. This document shows step-by-step how to install dkfilter for Postfix to deploy DomainKeys signing and verification.
Unix+clones

Encrypted remote backups made easy

Post date: November 29, 2006, 01:11 Category: Security Views: 3713 Comments
Tutorial quote: This is an easy way to take backups and putting them on a remote site. I invented this script in order to put backups on a reliable remote site where I unfortunatley only have a user account.
Solaris

NIST Publically-Released Fedora/Red Hat Core Security Guide

Post date: October 21, 2006, 04:10 Category: Security Views: 6066 Comments
Tutorial quote: The Benchmark is a compilation of security configuration actions and settings that "harden" Red Hat Linux operating systems. It is a CIS Level-I benchmark: the prudent level of minimum due care for operating system security. This benchmark was developed and tested on Red Hat Enterprise Linux (RHEL) including RHEL 2.1, RHEL 3.0, and Fedora Core 1, 2, & 3. It is likely to work for other Linux distributions - especially Red Hat and Fedora derivatives - as well.
Solaris

NSA Publically-Released Solaris 9 Security Guide

Post date: October 21, 2006, 04:10 Category: Security Views: 6464 Comments
Tutorial quote: Sun Solaris 9 Guides
NSA has developed and distributed configuration guidance for Sun Solaris 9 that is currently being used throughout the government and by numerous entities as a security baseline for their Sun Solaris systems.

Solaris

NSA Publically-Released Solaris 8 Security Guide

Post date: October 21, 2006, 04:10 Category: Security Views: 5942 Comments
Tutorial quote: Sun Solaris 8 Guides
NSA has developed and distributed configuration guidance for Sun Solaris 8 that is currently being used throughout the government and by numerous entities as a security baseline for their Sun Solaris systems.

OSX

NSA Publically-Released OS X Secuirty Configuration (reload) Guide

Post date: October 21, 2006, 04:10 Category: Security Views: 5581 Comments
Tutorial quote: Apple Mac OS X
NSA has developed and distributed configuration guidance for Apple Operating Systems. This guidance can be used by US government and other entities as a security baseline.

Unix+clones

Resetting a forgotten MySQL root password

Post date: October 2, 2006, 09:10 Category: Security Views: 4635 Comments
Tutorial quote: Resetting the root password of a MySQL database is trivial if you know the current password if you don't it is a little tricker. Thankfully it isn't too difficult to fix, and here we'll show one possible way of doing so.
Debian

How To Combat Viruses Using Your Postfix Configuration

Post date: September 18, 2006, 14:09 Category: Security Views: 3383 Comments
Tutorial quote: In this guide you will learn how to tweak the HowtoForge mail guide for Postfix (+Auth SMTP + Quota), setup to give better Virus protection.
Debian

Interested in securely sharing a secret?

Post date: September 17, 2006, 08:09 Category: Security Views: 2902 Comments
Tutorial quote: I needed a method for sharing a secret that required multiple agents to coordinate before the secret could be recovered. This is useful for encrypting keys used in critical backups. I decided to use an implementation of Shamir's Secret Splitting Scheme (The S in RSA).

Currently I'm using a program called 'ssss' to do secret sharing.
Web-based applications and online marketing solutions - LumoLink