Blog Posts Tagged with "Linux"

4ff49873e3fed9a24adf0d37ae00b780

A Review of the New Backtrack 5 Operating System

June 02, 2011 Added by:Lee Munson

If you are a computer security consultant, there is no better tool to use than Backtrack. If you own a company that has to store important data, then it is vital for you to have a tool like this so your security people can test your network with the same tools the bad guys are using...

Comments  (0)

4ed54e31491e9fa2405e4714670ae31f

Weaponizing the Nokia N900 Part 3.8: Backtrack 5

May 31, 2011 Added by:Kyle Young

You could setup your N900 on a victim network and have ssh listing on your public IPv6 address and then log in to your N900 from an outside network over IPv6. You wouldn’t even have to do any port forwarding on the victim’s firewall/gateway/router...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

PS3 Running Linux Serves Up LOIC in Sony DDoS Attack

April 06, 2011 Added by:Headlines

There is more than a touch of irony to the notion that a "jailbroken" PlaySation3 running an unsanctioned Linux operating system, the very impetus for the legal action brought by Sony against Hotz and Egorenkov, would be employed in a DDoS attack against Sony domains...

Comments  (1)

D8853ae281be8cfdfa18ab73608e8c3f

Destructive DOSKEY Aliases

March 07, 2011 Added by:Rob Fuller

The great thing is that there isn't a /delete - you just have to know that in order to remove a doskey macro you need to issue the command without the aliased part, so 'doskey tasklist=' will delete the tasklist macro...

Comments  (1)

4085079c6fe0be2fd371ddbac0c3e7db

U.S. Gov Configuration Baseline for Red Hat Enterprise Linux

March 01, 2011 Added by:Jamie Adams

On February 28 the U.S. Government Configuration Baseline (USGCB) for Red Hat Enterprise Linux 5 was released. The long awaited Security Content Automation Protocol (SCAP) content is the next phase in supplanting the legacy Bourne shell scripts known as the System Readiness Review (SRR) scripts...

Comments  (0)

314f19f082e69886c20e31c70fe6dceb

Using Ninja to Monitor And Kill Rogue Privilege Escalation

February 22, 2011 Added by:Rod MacPherson

Once a hacker (if they have malicious intent we'll call them crackers) has found a way onto a system s/he then usually needs to jump to the Administrator or system or root account. Ninja is a program for Linux (and presumably most Unix like OSes) that monitors for such privilege escalation...

Comments  (4)

4085079c6fe0be2fd371ddbac0c3e7db

Tips for Deploying Secure Shell in Linux and UNIX

January 10, 2011 Added by:Jamie Adams

Secure Shell is the best method for remote access due to its flexibility and security. It makes it attractive for system administrators as well as system developers and architects. The ability to easily execute commands on remote systems and retrieve files over “secure” channels is seductive...

Comments  (14)

4085079c6fe0be2fd371ddbac0c3e7db

Using Temporary Files in Linux Scripts Securely

December 07, 2010 Added by:Jamie Adams

Some sysadmins who write scripts might store sensitive data in temporary files, don't restrict access to temporary files, and might forget to remove them from the system when they are no longer needed. In many cases, they use them when it isn't even necessary...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Sandboxing: Understanding System Containment

November 29, 2010 Added by:Jamie Adams

The idea of containment within an operating system is sometimes referred to as sandboxing. Some of the more popular technologies specifically designed to accomplish this come to mind: FreeBSD jails, Solaris Containers (including Solaris Zones), and SUSE Linux's AppArmor...

Comments  (5)

4085079c6fe0be2fd371ddbac0c3e7db

Which Linux or UNIX Version Am I Running?

November 17, 2010 Added by:Jamie Adams

Linux distributions are built off of standard kernels but are packaged and bundled differently. Some distributions are Debian-based while others might be Red Hat-based. The collection of packages and how the packages were compiled and delivered are what make Linux distributions unique...

Comments  (2)

4085079c6fe0be2fd371ddbac0c3e7db

Implementing Linux File Systems Sensibly

October 13, 2010 Added by:Jamie Adams

Linux file systems are an essential operating system resource. Modern file systems and disk drive technology are robust and reliable — so, most administrators put little effort into planning or worrying about them once the operating system is configured. This makes me both smile and cringe...

Comments  (4)

4085079c6fe0be2fd371ddbac0c3e7db

Broken Links in Linux File Systems Can Be BAD

October 10, 2010 Added by:Jamie Adams

Broken links are not only annoying little Tribbles which consume file system resources, they also pose a security risk in the form of a Trojan Horse. A good system administrator will try to control these by using best practices, common sense, and educating their users...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Keeping Linux File Systems Clean and Secure

October 06, 2010 Added by:Jamie Adams

The term clean is also associated with performing file system checks to ensure structural integrity with tools such as fsck.ext3(8). In addition to these critical activities, you should routinely "clean" file system access controls — ownerships and permissions...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Linux Clusters: Keeping Nodes Securely Configured

October 04, 2010 Added by:Jamie Adams

Survivability is defined as the capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents. As a discipline, survivability builds on related fields of study such as security, fault tolerance, reliability, and performance...

Comments  (2)

4085079c6fe0be2fd371ddbac0c3e7db

Root Accounts - The Root of All Evil?

September 30, 2010 Added by:Jamie Adams

Too often administrators jump to the root level to perform routine tasks — this is when mistakes occur. The administrator is in a hurry and enters one wrong space, is in the wrong directory, or types an incorrect parameter - all can result in evil things when the ENTER key is pressed...

Comments  (15)

4085079c6fe0be2fd371ddbac0c3e7db

Lock Down Heartburn: Windows to Linux Migration

September 24, 2010 Added by:Jamie Adams

The process of lock down (hardening) is difficult, tedious, and time consuming even for an administrator working on an operating system they're familiar with. This process requires knowledge as to where to configure the item and often how to configure the item...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »