How to Configure OSSEC on Ubuntu 14.04 - Part 2

In our previous article we explained the installation of OSSEC on Ubuntu platform. In this part, first we will configure both client and server of OSSEC for rootkit detection, integrity checking and auditing features. Then we will integrate database with OSSEC and web interface for better analysis of logs and alerts. OSSEC Server Configuration After […]

Posted on : July 1, 2015 , Last Updated on : June 27, 2015 By
| Reply More

How to Install OSSEC Server-Client on Ubuntu 14.04 - Part 1

In this article our focus is OSSEC  which is an Open Source Host-based Intrusion Detection System (HIDS). It can be installed on Linux,Windows and MacOS. In this article, we will install OSSEC and web interface on Ubuntu distribution.  In our case, client and server of OSSEC will be linux machine. We assume that mysql and […]

Posted on : June 5, 2015 By
| Reply More

Howto Configure OpenVPN Server-Client on Ubuntu 15.04

Virtual private network (VPN) is a common name of several technologies which allows to establish a network connection over other network. It called virtual because nodes connected between each over through non physical lines. And it is private due to absence of public access to network without proper rights from of the network owner. OpenVPN […]

Posted on : June 1, 2015 , Last Updated on : November 8, 2016 By
| 2 Replies More

Install pfSense 2.2.2 Firewall for your Network - An Easy Guide !!

PfSense is a computer software distribution based on FreeBSD. It is installed on a computer to make a dedicated firewall/router for a network. The main advantage of this system is reliability and wide range of network functions and tools. Most of them can be found only in expensive commercial firewalls. Name of the system comes from […]

Posted on : May 14, 2015 , Last Updated on : November 8, 2016 By
| Reply More

How to Securely Store Passwords and Api Keys Using Vault

Vault is a tool that is used to access secret information securely, it may be password, API key, certificate or anything else. Vault provides a unified interface to secret information through strong access control mechanism and extensive logging of events. Granting access to critical information is quite a difficult problem when we have multiple roles […]

Posted on : April 30, 2015 , Last Updated on : May 3, 2015 By
| Reply More

4 Tools to Securely Delete Files from Linux

Any computer user with normal level skill set knows that any data removed from computer system can be recovered later with little bit of efforts. This is a good thing in the scenario when you have accidentally deleted your critical data. But in most cases, you don't want your private data to be recovered easily. Whenever we […]

Posted on : March 24, 2015 , Last Updated on : March 24, 2015 By
| 5 Replies More

How to Install and Configure AlienVault SIEM (OSSIM)

OSSIM (Open Source Security Information Management) is an open source project by Alienvault which provides the SIEM (Security information and event management) functionality. It provides following SIEM features which are required by security professionals. Event collection Normalization Correlation OSSIM is a unified platform which is providing the essential security capabilities. Many proven open source security […]

Posted on : February 24, 2015 , Last Updated on : February 23, 2015 By
| 1 Reply More

Install pyxmlsec - Python XML Security Library on Ubuntu

XML encryption and digital signature are used for the security of XML documents. XML encryption and digital signature implementation exists for different programming languages. However, implementation of XML encryption and digital signature in C language is very comprehensive. It supports many functions and based on LibXML2 library. PyXMLSec is the Python implementation for XML security […]

Posted on : February 13, 2015 , Last Updated on : February 12, 2015 By
| 2 Replies More

Intro to Configure IPsec VPN (Gateway-to-Gateway ) using Strongswan

Strongswan supports Gateway-to-Gateway (site-to-site) and Road warrior  types of VPN. In first type, network traffic is encrypted/decrypted on the gateway (entrance/exit) of an organization. However in Road warrior case, traffic encrypted from the end client (machine) to remote end gateway. In this article, we will explain creation of  tunnel between two sites of an organization […]

Posted on : February 10, 2015 , Last Updated on : November 8, 2016 By
| 20 Replies More

How to Create Jailed ssh User with Jailkit on Debian Wheezy

Hi there, today we'll be creating a jailed ssh user with Jailkit on a Debian Wheezy box. Jailkit is a set of utilities to limit user accounts to specific files using chroot() and or specific commands. Setting up a chroot shell, a shell limited to some specific command, or a daemon inside a chroot jail […]

Posted on : February 9, 2015 , Last Updated on : February 8, 2015 By
| 1 Reply More

Install Strongswan - A Tool to Setup IPsec Based VPN in Linux

IPsec is a standard which provides the security at network layer. It consist of authentication header (AH) and encapsulating security payload (ESP) components. AH provides the packet Integrity and confidentiality is provided by ESP component . IPsec ensures the following security features at network layer. Confidentiality Integrity of packet Source Non. Repudiation Replay attack protection […]

Posted on : February 3, 2015 , Last Updated on : November 8, 2016 By
| Reply More

How to Install SSL on Apache 2.4 in Ubuntu 14.0.4

Today I will show you how to install a SSL certificate on your personal website or blog, to help secure the communications between your visitors and your website. Secure Sockets Layer or SSL, is the standard security technology for creating an encrypted connection between a web server and a web browser. This ensures that all […]

Posted on : January 6, 2015 , Last Updated on : January 6, 2015 By
| Reply More

Auditd - Tool for Security Auditing on Linux Server

First of all , we wish all our readers Happy & Prosperous New YEAR 2015 from our Linoxide team. So lets start this new year explaining about Auditd tool. Security is one of the main factor that we need to consider. We must maintain it because we don't want someone steal our data. Security includes many […]

Posted on : January 1, 2015 , Last Updated on : December 31, 2014 By
| 3 Replies More

How to Hide Appplication Port Using knockd in Linux

As a system administrator, we should do everything to secure our server from attackers. As the internet grows, threats to our server is also growing. One of the popular entrances to attack our server is through the port on your server that open. If your SSH server is running on your machine, then usually the […]

Posted on : December 12, 2014 , Last Updated on : December 12, 2014 By
| Reply More