security

  1. G

    Is it right to use chmod 777 when this is the only option?

    Firstly good morning. I am a recent user of ubuntu, it must have been about two months that I use it, anyway, I started a WordPress course and in it we used xampp to not need to buy a direct host, however the problem is that WP cannot create new files, either when I download a new theme or...
  2. A

    Major security and usability flaw in Linux (root privileges and sudoers, folder access restriction, Ubuntu Linux)

    Alright, let me give you the context. I am a business owner with strong technical background, say a programmer, though not an advanced system administrator. I've bought a VPS server where I want to host several applications and webpages. One of the apps consists of backend, admin frontend and...
  3. U

    second encrypted and mounted operating system

    Good day all I am currently working on a project where the goal is to have a second operating system (Kali Linux) encrypted and mountable/unmountable on a Ubuntu system. All work must be kept on the encrypted partition and nothing can be installed or held on the Ubuntu operating system. There...
  4. G

    Disable Selinux Temporarily

    I want to dislabe SeLinux but this will be temporary where after reboot it should be enabled.
  5. Feriman22

    Portscan Protection

    Hi, based on this solution I wrote a shell script, which is blocking port scanning, so nobody can find (or much more slowly) your "hidden" SSH or FTP port The protection based on built-in firewall. The script stored on GitHub: Portcan Protection I hope you find it useful! Best Regards, Feriman
  6. P

    Protect authorized_keys and known_hosts?

    /home/me/.ssh/known_hosts /home/me/.ssh/authorized_keys I would like to put these files to an €ncrypt€d folder that is being decrypted manually after Linux Raspbian 10 start. Why? i do not want anyone to discover that files contents (consider someone steal the drive - my Raspbian installed from...
  7. lg4l

    Compromised machine...help would be appreciated.

    I'm a recent Linux convert and it's been a blast these past sev mos. breaking Mint, re-installing, learning....rinse, repeat. But this a bit more serious. Linux Mint 19.3...I'm contantly tinkering on this machine. I had every intention of learning how to PROPERLY utilize "secure boot" today and...
  8. D

    Does Linux Lite collect any personal information by default?

    I have installed the latest version of Linux Lite on my lenovo G50 laptop. Recently, I have been concerned about the way various linux distros are collecting a substantial amount of personal information from linux users around the world. And in a lot of linux distros, there isn’t a...
  9. M

    Help with materials for blocking some USB communication

    Hello, I am currently working on bachelor thesis named "Access Controll for USB Bus". As title says, I need to make software, which will block some USB devices, depending on user input (specific type of USB, for example all mouses or all devices from specific vendor). Unfortunately, my...
  10. G

    Install Nessus Vulnerability Scanner To Linux

    I want to install nessus non commercial version into my Linux ubuntu box. How can I get and install nessus? Thanks
  11. Y

    Linux redhat 7.4 (Maipo) Auditing

    Hi, I am trying to start auditing on chown/chmod commands. It is working (ie logs are written to audit file) with auditctl ctl command line utility but when I am putting in the /etc/audit/rules.d/audit.rules file, it doesn't work. Below is the command used. Immutable tag is commented and the...
  12. G

    How can I find suid files In Linux?

    From security perspective of my linux boxes I want to list suid enabled files with the find command.
  13. Trafalmagorian

    Advertisers and trackers on Linux

    Apologies if this post is naive or just plain dumb. BUT, here goes. I just installed Linux Mint on my system. I like the way it works; its simplicity, elegance really. I like the command line interface; takes me back to programming in Fortran in 1974! However, my expectations were that Linux...
  14. D

    Security and VPN's

    I'm a new convert to Linux and very much like the usability. My main concern when switching over was security as I handle some sensitive information on my computer, and maybe have an all to healthy sense of paranoia. This is partly my reason for switching over. I have an account with CactusVPN...
  15. X

    BlackArch, Kali, Parrot or Tails???

    Anyone have thoughts on the pros & cons of these "security" distros?
  16. J

    how to bypass linux /bin/login file using radare2

    has anyone tried disassembling the /bin/login file and bypass it. I am trying but its difficult to find the point of faliure plz suggest if anyone has tried it
  17. NickBBB

    Most secure and Easiest to use Linux Distro for new users in Sep 2018.

    I am wondering everyone's thoughts on the best Linux distro for a new user that seeks security, anonymity, and ease of use. I am aware that live booting and VM's are a thing, but also want to know what people think for the primary distro. Thank for your input. :)
  18. Tobby P

    Domain specific language best practices

    I’m discussing usage of DSL (domain specific language) in security tools with my colleagues. We haven't been able to reach an agreement over naming conventions. There are many tools using DSL: splunk, sumologic, elasticsearch and etc. But what are the best practices? So for example how would...
  19. atanere

    Favorite Password Manager

    You can't have too much security these days. After years of using a little notebook to record much-too-simple passwords, I realized the time had finally come to choose a password manager. But there are many to choose from, even in the Linux world, and we all have different needs. For me, I did...
  20. RoseHosting

    Secure your SSH using two-step authentication on CentOS 7

    Running your own Linux server could be very challenging, especially if you want to keep the security of the server on a high level and to protect the personal data as much as possible. During the initial server setup, you may have generated an RSA key pair to connect to the server without using...
Top