security

  1. P

    Protect authorized_keys and known_hosts?

    /home/me/.ssh/known_hosts /home/me/.ssh/authorized_keys I would like to put these files to an €ncrypt€d folder that is being decrypted manually after Linux Raspbian 10 start. Why? i do not want anyone to discover that files contents (consider someone steal the drive - my Raspbian installed from...
  2. lg4l

    Compromised machine...help would be appreciated.

    I'm a recent Linux convert and it's been a blast these past sev mos. breaking Mint, re-installing, learning....rinse, repeat. But this a bit more serious. Linux Mint 19.3...I'm contantly tinkering on this machine. I had every intention of learning how to PROPERLY utilize "secure boot" today and...
  3. D

    Does Linux Lite collect any personal information by default?

    I have installed the latest version of Linux Lite on my lenovo G50 laptop. Recently, I have been concerned about the way various linux distros are collecting a substantial amount of personal information from linux users around the world. And in a lot of linux distros, there isn’t a...
  4. M

    Help with materials for blocking some USB communication

    Hello, I am currently working on bachelor thesis named "Access Controll for USB Bus". As title says, I need to make software, which will block some USB devices, depending on user input (specific type of USB, for example all mouses or all devices from specific vendor). Unfortunately, my...
  5. G

    Install Nessus Vulnerability Scanner To Linux

    I want to install nessus non commercial version into my Linux ubuntu box. How can I get and install nessus? Thanks
  6. Y

    Linux redhat 7.4 (Maipo) Auditing

    Hi, I am trying to start auditing on chown/chmod commands. It is working (ie logs are written to audit file) with auditctl ctl command line utility but when I am putting in the /etc/audit/rules.d/audit.rules file, it doesn't work. Below is the command used. Immutable tag is commented and the...
  7. G

    How can I find suid files In Linux?

    From security perspective of my linux boxes I want to list suid enabled files with the find command.
  8. Trafalmagorian

    Advertisers and trackers on Linux

    Apologies if this post is naive or just plain dumb. BUT, here goes. I just installed Linux Mint on my system. I like the way it works; its simplicity, elegance really. I like the command line interface; takes me back to programming in Fortran in 1974! However, my expectations were that Linux...
  9. D

    Security and VPN's

    I'm a new convert to Linux and very much like the usability. My main concern when switching over was security as I handle some sensitive information on my computer, and maybe have an all to healthy sense of paranoia. This is partly my reason for switching over. I have an account with CactusVPN...
  10. X

    BlackArch, Kali, Parrot or Tails???

    Anyone have thoughts on the pros & cons of these "security" distros?
  11. J

    how to bypass linux /bin/login file using radare2

    has anyone tried disassembling the /bin/login file and bypass it. I am trying but its difficult to find the point of faliure plz suggest if anyone has tried it
  12. NickBBB

    Most secure and Easiest to use Linux Distro for new users in Sep 2018.

    I am wondering everyone's thoughts on the best Linux distro for a new user that seeks security, anonymity, and ease of use. I am aware that live booting and VM's are a thing, but also want to know what people think for the primary distro. Thank for your input. :)
  13. Tobby P

    Domain specific language best practices

    I’m discussing usage of DSL (domain specific language) in security tools with my colleagues. We haven't been able to reach an agreement over naming conventions. There are many tools using DSL: splunk, sumologic, elasticsearch and etc. But what are the best practices? So for example how would...
  14. atanere

    Favorite Password Manager

    You can't have too much security these days. After years of using a little notebook to record much-too-simple passwords, I realized the time had finally come to choose a password manager. But there are many to choose from, even in the Linux world, and we all have different needs. For me, I did...
  15. RoseHosting

    Secure your SSH using two-step authentication on CentOS 7

    Running your own Linux server could be very challenging, especially if you want to keep the security of the server on a high level and to protect the personal data as much as possible. During the initial server setup, you may have generated an RSA key pair to connect to the server without using...
  16. K

    disallow specific ssh ciphers and/or MACS (white list approach)

    Hi people, I have a report detailing weak ssh ciphers on a system. How can I dis-allow these specific weak ciphers. The common solution which I am aware of is adding the following lines in sshd_config (which is a black list approach): Ciphers aes128-ctr,aes192-ctr,aes256-ctr...
  17. Rob

    [CentOS-announce] CESA-2017:1109 Moderate CentOS 6 java-1.8.0-openjdk Security Update

    CentOS Errata and Security Advisory 2017:1109 Moderate Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-1109.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386...
  18. Rob

    [CentOS-announce] CESA-2017:1100 Critical CentOS 7 nss-util Security Update

    CentOS Errata and Security Advisory 2017:1100 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-1100.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64...
  19. Rob

    [CentOS-announce] CESA-2017:1100 Critical CentOS 7 nss Security Update

    CentOS Errata and Security Advisory 2017:1100 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-1100.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64...
  20. Rob

    [CentOS-announce] CESA-2017:1106 Critical CentOS 7 firefox Security Update

    CentOS Errata and Security Advisory 2017:1106 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-1106.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64...
Top