SECURITY

This category includes articles dealing with softwares and tools helps operationg system / network security.

How to Manually Install Security Updates on Ubuntu 18.04

Install Security Updates Ubuntu

One of the most crucial tasks that a systems administrator needs to undertake is ensuring that systems are patched with the latest security updates. Ubuntu is considered as one of the most secure Linux distributions but it can be susceptible [...]

Jamie Arthur 12:05 am

Cryptomator - Encrypt your Cloud Data Files on Linux

cryptomator encrypt cloud files

Figuring out a good path to security for your cloud data can be quite a challenge. Normally, the cloud is a very safe place for data, despite Fear, Uncertainty and Doubt (FUD) from those who might want to access their [...]

Alain Francois 12:33 am

How to Install Enpass on Linux

install enpass

Enpass is a cross-platform password manager that works on almost all major Desktop and smartphone platforms like Macs, Windows, Android, iOS, Blackberry, and Linux. Optionally, you can sync across all these devices using your own trusted cloud accounts very securely. [...]

Saheetha Shameer 6:07 pm

Heimdall - A Tool to Manage Vulnerable Packages on Linux & Unix Systems

heimdall vulnerability management

Heimdall is a tool to manage all the vulnerabilities that are found in the Linux distributions installed in your servers or desktops. The centralized heimdall server collects all the vulnerabilities data from client machines through heimdall agent. This agent that [...]

Dwijadas Dey 2:00 am

Cipher - Command Line Tool to Encrypt/Decrypt Files and Directories

cipher encrypt file linux

ss you take some security measures to protect your environment and encrypt your data. Linux offers some encryption methods and there are some tools which can help you to encrypt your data. Encryption is important when you need to communicate sensitive information [...]

Alain Francois 2:00 am

How to Setup osquery to Monitor Security Threat on Ubuntu

osquery monitor security tool

OSQUERY is an open source tool developed by Facebook for querying various information related to the state of your machines like running processes, loaded Kernel modules, active logged in users, active listening ports etc. This system instrumentation framework make low-level [...]

Dwijadas Dey 3:00 am

How to Configure IPsec VPN Using Libreswan

setkey output of ipsec vpn

The purpose of IPsec based VPN is to encrypt traffic at the network layer of the OSI model so the attacker cannot eavesdrop between client and the VPN server. In our previous articles on strongswan which is also provides the [...]

shah 3:00 am

How to Use GPG Commands to Create Public key for Secure Communication

Let us first try to understand what is encryption. Encryption is a process of embedding plain text data in such a way that it cannot be decoded by outsiders. It is necessary to encrypt data to prevent misuse. The GNU [...]

Alain Francois 3:00 am

How to Setup OpenVPN Access Server on AWS

OpenVPN AS change hostname

This article covers how to setup OpenVPN access server using amazon's machine image. OpenVPN is an open source application that uses a VPN method for creating a secure connection between point-to-point OR site-to-site connections in bridged/routed mode. It uses SSL [...]

Dwijadas Dey 3:00 am

How to Configure L2TP over IPsec using Freeradius on Ubuntu

Layer 2 tunneling protocol (L2TP) with IPsec  is used to ensure end-to-end encryption because L2TP does not support security features. OpenSwan tool is used to establish IPsec tunnel which will be compiled on Ubuntu distribution. The authentication security feature is [...]

shah 3:00 am

How to Setup Vuls Vulnerability Scanner in Linux

VULS is a security vulnerability scanner for Linux. It downloads the NVD (National Vulnerability Database) and inserts into a sqlite database. Vuls has built in CVE dictionary for this sqlite file. The servers are connected using key based authorization, hence we need [...]

Saheetha Shameer 3:50 am

How to Install Softether VPN server on Centos 7

Setting up your own virtual private network server is a good way to evade blockage and be able to access sites that are blocked in your country. Choice of open source VPN packages is long but today we decided to [...]

Mihajlo Milenovic 3:00 am

How to Setup Volatility Tool for Memory Analysis

In the IT security field, memory or Random Access Memory (RAM) analysis  helps to identify the malicious or illegal activities in the system. RedLine is a free for volatile memory analysis tool which is provided by Mandiant (FireEye company). However, [...]

shah 3:00 am

How to Download Files using Https from Nginx Docker Containers

As  system administrators, we have situations where we need to download large files such as backup files, database backups, emails, log files etc securely between our servers. Usually we use SFTP, SSH or SCP for this purposes. But these processes slow down [...]

Saheetha Shameer 3:00 am