RSSCategory: SECURITY

Create Your Own Certificate Authority (CA) in CentOS / RHEL

A certificate authority (CA) issues digital certificates that certifies the ownership of a public key by the named subject of the certificate. Trusted certificates are typically used to make secure connections to a server over the Internet. A certificate is required in order to avoid the case that a malicious party which happens to be […]

Posted on : November 10, 2014 , Last Updated on : November 10, 2014 By
| 4 Replies More

Find / Patch Shellshock Bash Bug in RedHat / CentOS, Fedora & Ubuntu

Stephane Schazelas has recently discovered a very serious security bug in GNU Bourne Again Shell (Bash) that allows attackers to exploit a machine by executing remote code. Shellshock (the name for this security bug) can cause serious problems to your system because it makes possible to trick bash into running a program that it wasn't […]

Posted on : September 28, 2014 , Last Updated on : October 1, 2014 By
| 1 Reply More

Arptables - Manage ARP Packet Filter Rules with Examples

ARP stands for Address Resolution Protocol, it's a telecommunication protocol used for resolution of network layer addresses into link layer addresses, a critical function in multiple-access networks. In general ARP is used to convert an IP address to a physical address such as an Ethernet address (also known as a MAC address). arptables is similar […]

Posted on : September 24, 2014 , Last Updated on : September 25, 2014 By
| 1 Reply More

15 Linux Hardening Steps to Keep Your Server Protected

Server hardening is the process of enhancing server security through various methods. We have a lot of steps to secure a server. Keep yourself and your company out by protecting your Linux systems from hackers, crackers, and attackers! You can turn a vulnerable box into a hardened server via the following steps. It will help you […]

Posted on : March 10, 2014 , Last Updated on : June 10, 2017 By
| 2 Replies More

Features, Installation, Usage of Network Security Toolkit (NST) in Linux

There are so many Linux distribution in the world now. From general Linux category until specific purpose of Linux. Today we will see a sneak peak of Network Security Toolkit Linux. What is Network Security Toolkit (NST) Linux NST is a Linux distribution based on Fedora Linux. NST provides security toolkit for professionals and network […]

Posted on : February 21, 2014 , Last Updated on : February 20, 2014 By
| Reply More

Linux Brute force Protection - Scan Logs and Detects patterns using fail2ban

Fail2ban is the latest security tool to protect your server from brute force attack.It automatically protect the server from hackers.It works by monitoring through log files and reacting to offending actions like repeated failed login attempts. The process consists of adding a new rule in a firewall chain and sending an e-mail notification.  You can easily […]

Posted on : February 7, 2014 , Last Updated on : April 6, 2014 By
| Reply More

Lynis - Security Tool for Audit and Hardening Linux / Unix Systems

System administrator must have known about the importance of security. Maintaining servers are not just make the server is up and running but it should be secure too. Security is not coming by default. We need to tune-up the systems to fit our needs. Since security has a wide coverage, sometimes its easy for us […]

Posted on : January 2, 2014 , Last Updated on : January 1, 2014 By
| 3 Replies More

Security Issue, Wifi Passwords Are Not Encrypted In Ubuntu Systems

Dear ubuntu user, This article is very important for you! Did you know that wifi passwords are not encrypted on Ubuntu systems? They are stored in clear text in a folder outside the home folder so they are accessible for unwanted users. This issue has been reported and a Canonical developer has explained in the […]

Posted on : December 31, 2013 , Last Updated on : December 30, 2013 By
| 1 Reply More

A Very Sophisticated Linux Backdoor Targeting Big Companies

A large Internet hosting provider has been target of a very sophisticated linux trojan in May of this year. The target of this attack was the customer data such as usernames, emails, password and financial information which was accessible, but encrypted. According to the symantec official blog, this attack was more sophisticated than what they […]

Posted on : November 15, 2013 , Last Updated on : December 9, 2013 By
| Reply More

How To Encrypted Root Partition / Filesystem

An understanding of how your computer boots is required, because unlocking an encrypted root filesystem is integral to the bootstrap process. The current, stable kernel series, 2.6, optionally uses initramfs to help boot, Initramfs is a cpio archive that the kernel now knows how to unpack into a RAM-based disk. This unpacked filesystem contains a […]

Posted on : January 4, 2013 , Last Updated on : October 16, 2016 By
| Reply More

Learn How Linux Login Logout Virus Affect The System

Linux virus, oops, well we have heard long enough about it and I am also is not going to throw any more information security jargons like ASLR attacks (address space layout randomization) or buffer overflow payloads designed from well known applications like backtrack kits (security related), i will explain here small script kiddies that you […]

Posted on : December 23, 2012 , Last Updated on : October 16, 2016 By
| Reply More

Example : Linux File Encrypt / Decrypt Using Mcrypt Command

Mcrypt is a replacement command of one of the popular Unix Crypt command. Crypt in UNIX was one of the file encryption tools which were using one of the popular algorithms similar to World War II enigma cipher. Mcrypt is also the similar command and it provides same functionality. So, we can say Mcrypt is […]

Posted on : September 4, 2012 , Last Updated on : October 20, 2016 By
| Reply More

Install/Configure CHKROOTKIT On Linux: Security Scanner

The chkrootkit is a common security scanner which helps the administrators to search the local system for signs that it is infected with a 'rootkit'. A rootkit can be considered as a malicious program which can take control over a computer system without the computer system user knowing about it. This means that the rootkit […]

Posted on : November 15, 2011 , Last Updated on : October 14, 2016 By
| 1 Reply More