I got this from Study4cyberwar. This site is dedicated to cyberwar information. They have some good information to keep you updat...
Sunday, June 20, 2010
Using ClamAV to Protect Your Windows Clients
ClamAV can scan incoming emails and you also can configure Squid web proxy to use ClamAV as well. One of the coolest options is that Samba can be configured to use ClamAv to scan files when they are accessed. Note: Using ClamAV on your Linux servers to sanitize oncoming data to filter email and HTTP traffic won't make you completely...
Wednesday, May 12, 2010
Controlling login attempts with PAM (Pluggable Authentication Module)
It is generally a good and sensible practice to lock out a user after a number of failed login attempts, with some exceptions. You don't want to give an intruder unlimited attempts, but you don't want clumsy users pestering you all the time for login resets. And users who wish to play practical jokes locking out other users by trying...
Working with User and Group Management
Group Commands
Group definitions reside in the /etc/group file. A standard Linux /etc/group file contains the following information: groupname:x:groupid:user list.
The “x” in the group definition file is a deprecated placeholder for a group password.
To find out which groups you belong to, type groups at a command prompt.
$...
Saturday, April 24, 2010
Reset the MySQL root password on Ubuntu/Debian Linux
How to change the MySQL root password. Enter the following lines in your terminal.
Stop the MySQL Server.
sudo /etc/init.d/mysql stop
Start the mysqld configuration.
sudo mysqld --skip-grant-tables &
Login to MySQL as root.
mysql -u root mysql
Replace YOURNEWPASSWORD with your new password!
UPDATE user SET Password=PASSWORD('YOURNEWPASSWORD')...
Sunday, April 11, 2010
Preventing SSH Attacks With DenyHosts
SSH is a great way to remotely administer a server. However, it still has a number of issues when you open it up to the world. The server and client communications are secure but that doesn’t mean the hosts involved are. Opening an SSH service to the world allows for brute force attacks and means that the carbon interface is still...
Saturday, February 20, 2010
Working with Debian packages from the Command Line.
Here is a few command line entries that I use almost daily.
apt-cache search (packagename)will produce the following:
chicagonpg@Quadzilla ~ $ apt-cache search gftp
gftp-common - shared files for other gFTP packages
gftp-gtk - X/GTK+ FTP client
gftp - X/GTK+ FTP client
gftp-text - colored FTP client using GLib
Then to install...
Subscribe to:
Posts (Atom)