Skip to main content

Posts

Protecting Systems Logs & Controlling User Accounts

Protecting Systems Logs In Linux your log files are located in the “/var/log/*log”. If a hacker does not want leave there tracks they would delete these files after they were done. One way to protect these files is to restrict access to log directories and files by normal users. Use this command “chmod 640 /var/log/*log”. To read more download the PDF Title: Protecting Systems Logs & Controlling User Accounts File Name: PSLCUA.pdf File Type: PDF File Size: 819 KB Download Now

Disabling unnecessary services

Chkconfig Enabling or disabling services on Linux it is simple to do. Like in windows you go to the run command type "msconfig" and go to the service tab and start enabling or disabling services. The only problem with the Microsoft version is that the operating system does not allow selecting which services to start when in safe mode. Linux version of this does allow you select which services to be turned on or off. The chkconfig is used to manipulate the run level links at boot time. It can be thought of as a fron-tend to insserv. Chkconfig can run in six different modes: terse list mode, set mode, edit mode, list mode, add mode and delete mode. The last three modes were added for compatibility reasons. (From: http://man-wiki.net/index.php/8:chkconfig ). Read the PDF to read more about it.     Title: Chkconfig Settings File Name: Chkconfig.pdf File Type: PDF File Size: 1.17 MB  Download Now

Protecting the Kernel

Standard Linux Kernel When installing Linux it comes with the default Linux kernel compiled which is okay for most user, but when it comes to protect your data it is also good idea to build your own secure configuration. To get latest state or beta version of the kernel go to http://www.kernel.org/ Note: if you’re still unsure or feel uneasy if you want to do this then this is not for you. To get full details on compiling Linux Kernel you can visit: http://www.digitalhermit.com/linux/Kernel-Build-HOWTO.html#CONFIGURATION-INTRO http://www.faqs.org/docs/Linux-HOWTO/Kernel-HOWTO.html For security reason the DTS server kernel configuration can not be shown.

Linux Security

Linux security has several categories and these also include the controlling of the Linux file permissions & attributes, protecting the kernel, disabling unnecessary services, protecting systems logs, and maintaining user accounts. I am going to post a different PDF each day and today pdf is going to Linux file permissions & attributes. Read the pdf to read more about it.   Linux file permissions & attributes - 11/19/2010 Protecting the kernel  - 11/20/2010 Disabling unnecessary services - 11/22/2010 Protecting systems logs - 11/23/2010 Maintaining user accounts - 11/24/2010   File Name: Linux Security.pdf File Type: PDF File Size: 1,090 KB Download now

Extract Embedded Media From Office Documents by Changing the Extension

Need to get one or more images out of a Microsoft Office such as Word with a extension of a .DOC or .DOCX file? This only works with Microsoft 2007 or later or another .DOCX compatible program. If it's a .DOC file, open it in Word and save as a .DOCX file. Make a duplicate of the file and rename the extension from .DOCX to .ZIP. Open the zip archive and you should see several folders. You're looking for the media folder which in this should be under the word folder. (from LifeHacker.com) Extract Embedded Media From Office Documents by Changing the Extension

What is Nikto

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1000 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated. Nikto is not designed as an overly stealthy tool. It will test a web server in the quickest time possible, and is fairly obvious in log files. (From: http://cirt.net/nikto2) Features of Nikto Here are some of the major features of Nikto. See the documentation for a full list of features and how to use them.   SSL Support (Unix with OpenSSL or maybe Windows with ActiveState's   Perl/NetSSL)   Full HTTP proxy support Read on more on the P...

SSH

SSH (Secure Shell) is a network protocol that allows data to be exchanged using a secure channel between two networked devices. The two major versions of the protocol are referred to as SSH1 or SSH-1 and SSH2 or SSH-2. Used primarily on Linux and Unix based systems to access shell accounts, SSH was designed as a replacement for Telnet and other insecure remote shells, which send information, notably passwords, in plaintext, rendering them susceptible to packet analysis. The encryption used by SSH is intended to provide confidentiality and integrity of data. Read on by reading the PDF.  Title: Using & Configure SSH File Name: SSH.pdf File Type: PDF File Size: 1.23 MB Download Now