Howto Configure OpenVPN Server-Client on Ubuntu 15.04

Virtual private network (VPN) is a common name of several technologies which allows to establish a network connection over other network. It called virtual because nodes connected between each over through non physical lines. And it is private due to absence of public access to network without proper rights from of the network owner. OpenVPN […]

June 1, 2015 | By
| 2 Replies More

Install pfSense 2.2.2 Firewall for your Network - An Easy Guide !!

PfSense is a computer software distribution based on FreeBSD. It is installed on a computer to make a dedicated firewall/router for a network. The main advantage of this system is reliability and wide range of network functions and tools. Most of them can be found only in expensive commercial firewalls. Name of the system comes from […]

May 14, 2015 | By
| Reply More

How to Securely Store Passwords and Api Keys Using Vault

Vault is a tool that is used to access secret information securely, it may be password, API key, certificate or anything else. Vault provides a unified interface to secret information through strong access control mechanism and extensive logging of events. Granting access to critical information is quite a difficult problem when we have multiple roles […]

April 30, 2015 | By
| Reply More

4 Tools to Securely Delete Files from Linux

Any computer user with normal level skill set knows that any data removed from computer system can be recovered later with little bit of efforts. This is a good thing in the scenario when you have accidentally deleted your critical data. But in most cases, you don't want your private data to be recovered easily. Whenever we […]

March 24, 2015 | By
| 4 Replies More

How to Install and Configure AlienVault SIEM (OSSIM)

OSSIM (Open Source Security Information Management) is an open source project by Alienvault which provides the SIEM (Security information and event management) functionality. It provides following SIEM features which are required by security professionals. Event collection Normalization Correlation OSSIM is a unified platform which is providing the essential security capabilities. Many proven open source security […]

February 24, 2015 | By
| 1 Reply More

Install pyxmlsec - Python XML Security Library on Ubuntu

XML encryption and digital signature are used for the security of XML documents. XML encryption and digital signature implementation exists for different programming languages. However, implementation of XML encryption and digital signature in C language is very comprehensive. It supports many functions and based on LibXML2 library. PyXMLSec is the Python implementation for XML security […]

February 13, 2015 | By
| Reply More

Intro to Configure IPsec VPN (Gateway-to-Gateway ) using Strongswan

Strongswan supports Gateway-to-Gateway (site-to-site) and Road warrior  types of VPN. In first type, network traffic is encrypted/decrypted on the gateway (entrance/exit) of an organization. However in Road warrior case, traffic encrypted from the end client (machine) to remote end gateway. In this article, we will explain creation of  tunnel between two sites of an organization […]

February 10, 2015 | By
| 20 Replies More

How to Create Jailed ssh User with Jailkit on Debian Wheezy

Hi there, today we'll be creating a jailed ssh user with Jailkit on a Debian Wheezy box. Jailkit is a set of utilities to limit user accounts to specific files using chroot() and or specific commands. Setting up a chroot shell, a shell limited to some specific command, or a daemon inside a chroot jail […]

February 9, 2015 | By
| 1 Reply More

Install Strongswan - A Tool to Setup IPsec Based VPN in Linux

IPsec is a standard which provides the security at network layer. It consist of authentication header (AH) and encapsulating security payload (ESP) components. AH provides the packet Integrity and confidentiality is provided by ESP component . IPsec ensures the following security features at network layer. Confidentiality Integrity of packet Source Non. Repudiation Replay attack protection […]

February 3, 2015 | By
| Reply More

How to Install SSL on Apache 2.4 in Ubuntu 14.0.4

Today I will show you how to install a SSL certificate on your personal website or blog, to help secure the communications between your visitors and your website. Secure Sockets Layer or SSL, is the standard security technology for creating an encrypted connection between a web server and a web browser. This ensures that all […]

January 6, 2015 | By
| Reply More

Auditd - Tool for Security Auditing on Linux Server

First of all , we wish all our readers Happy & Prosperous New YEAR 2015 from our Linoxide team. So lets start this new year explaining about Auditd tool. Security is one of the main factor that we need to consider. We must maintain it because we don't want someone steal our data. Security includes many […]

January 1, 2015 | By
| 3 Replies More

How to Hide Appplication Port Using knockd in Linux

As a system administrator, we should do everything to secure our server from attackers. As the internet grows, threats to our server is also growing. One of the popular entrances to attack our server is through the port on your server that open. If your SSH server is running on your machine, then usually the […]

December 12, 2014 | By
| Reply More

Create Your Own Certificate Authority (CA) in CentOS / RHEL

A certificate authority (CA) issues digital certificates that certifies the ownership of a public key by the named subject of the certificate. Trusted certificates are typically used to make secure connections to a server over the Internet. A certificate is required in order to avoid the case that a malicious party which happens to be […]

November 10, 2014 | By
| 4 Replies More

Find / Patch Shellshock Bash Bug in RedHat / CentOS, Fedora & Ubuntu

Stephane Schazelas has recently discovered a very serious security bug in GNU Bourne Again Shell (Bash) that allows attackers to exploit a machine by executing remote code. Shellshock (the name for this security bug) can cause serious problems to your system because it makes possible to trick bash into running a program that it wasn't […]

September 28, 2014 | By
| 1 Reply More