Skip to main content

Home/ Ubuntu - Linux for human beings/ Group items tagged security

Rss Feed Group items tagged

munna1357

ssh key and DHCP configuration linux commands step by step - YouTube - 0 views

  •  
    One fundamental instrument to ace as a framework overseer is SSH. SSH, or Secure Shell, is a convention used to safely sign onto remote frameworks. It is the most widely recognized approach to get to remote Linux and Unix-like servers.  There are two or three ways that you can get to a shell (summon line) remotely on most Linux/Unix frameworks. One of the more established courses is to utilize the telnet program, which is accessible on most system skilled working frameworks. Getting to a shell account through the telnet strategy however represents a risk in that everything that you send or get over that telnet session is obvious in plain content on your neighborhood system, and the nearby system of the machine you are associating with. So any individual who can "sniff" the association in the middle of can see your username, secret key, email that you read, and charges that you run. Therefore you require a more refined system than telnet to associate with a remote host.  SSH, which is an acronym for Secure SHell, was planned and made to give the best security while getting to another PC remotely. Not just does it scramble the session, it gives better confirmation offices, and in addition highlights like secure document exchange, X session sending, port sending and all the more with the goal that you can build the security of different conventions. It can utilize diverse types of encryption extending anywhere in the range of 512 piece on up to as high as 32768 bits and incorporates figures like AES (Advanced Encryption Scheme), Triple DES, Blowfish, CAST128 or Arcfour. Obviously, the higher the bits, the more it will take to produce and utilize keys and in addition the more it will take to disregard information the association.
  •  
    One fundamental instrument to ace as a framework overseer is SSH. SSH, or Secure Shell, is a convention used to safely sign onto remote frameworks. It is the most widely recognized approach to get to remote Linux and Unix-like servers.  There are two or three ways that you can get to a shell (summon line) remotely on most Linux/Unix frameworks. One of the more established courses is to utilize the telnet program, which is accessible on most system skilled working frameworks. Getting to a shell account through the telnet strategy however represents a risk in that everything that you send or get over that telnet session is obvious in plain content on your neighborhood system, and the nearby system of the machine you are associating with. So any individual who can "sniff" the association in the middle of can see your username, secret key, email that you read, and charges that you run. Therefore you require a more refined system than telnet to associate with a remote host.  SSH, which is an acronym for Secure SHell, was planned and made to give the best security while getting to another PC remotely. Not just does it scramble the session, it gives better confirmation offices, and in addition highlights like secure document exchange, X session sending, port sending and all the more with the goal that you can build the security of different conventions. It can utilize diverse types of encryption extending anywhere in the range of 512 piece on up to as high as 32768 bits and incorporates figures like AES (Advanced Encryption Scheme), Triple DES, Blowfish, CAST128 or Arcfour. Obviously, the higher the bits, the more it will take to produce and utilize keys and in addition the more it will take to disregard information the association.
munna1357

ftp configuration in linux with users and configuring permisions - YouTube - 0 views

  •  
    The framework is currently a ftp server and can acknowledge associations. To arrange the server to consequently begin the administration at boot time, execute the charge chkconfig vsftpd on as root. To stop the server, execute the order administration vsftpd stop.  Document Transfer Protocol (FTP) is one of the most seasoned and most ordinarily utilized conventions found on the Internet today. Its motivation is to dependably exchange documents between PC has on a system without requiring the client to log specifically into the remote host or know about how to utilize the remote framework. It permits clients to get to records on remote frameworks utilizing a standard arrangement of basic summons.  The Very Secure FTP Daemon (vsftpd) is planned from the beginning to be quick, stable, and, above all, safe. Its capacity to handle vast quantities of associations productively and safely is the reason vsftpd is the main stand-alone FTP conveyed with Red Hat Enterprise Linux.  In Red Hat Enterprise Linux, the vsftpd bundle gives the Very Secure FTP daemon. Run the rpm - q vsftpd order to check whether vsftpd is introduced:
  •  
    The framework is currently a ftp server and can acknowledge associations. To arrange the server to consequently begin the administration at boot time, execute the charge chkconfig vsftpd on as root. To stop the server, execute the order administration vsftpd stop.  Document Transfer Protocol (FTP) is one of the most seasoned and most ordinarily utilized conventions found on the Internet today. Its motivation is to dependably exchange documents between PC has on a system without requiring the client to log specifically into the remote host or know about how to utilize the remote framework. It permits clients to get to records on remote frameworks utilizing a standard arrangement of basic summons.  The Very Secure FTP Daemon (vsftpd) is planned from the beginning to be quick, stable, and, above all, safe. Its capacity to handle vast quantities of associations productively and safely is the reason vsftpd is the main stand-alone FTP conveyed with Red Hat Enterprise Linux.  In Red Hat Enterprise Linux, the vsftpd bundle gives the Very Secure FTP daemon. Run the rpm - q vsftpd order to check whether vsftpd is introduced:
Tim Mullins

Ubuntu Linux Security ClamTK Anti-Virus Firestarter Firewall Screencast Tutorial - 1 views

  •  
    Screencast Tutorial on how to setup Ubuntu Linux Security with clamtk Anti-Virus and Firestarter Firewall. Demo done with Ubuntu Linux 64bit 9.10 Karmic Koala, Recordmydesktop, kdenlive, cheese, clamtk, firestarter. Original video production
Frank Boros

How to Install & Configure Vsftpd on RHEL/CentOS/Ubuntu/Fedora - 0 views

  •  
    How to Install and Configure Vsftpd Ftp Server on RHEL 6/ CentOS 6.2/ Ubuntu 11.10/ Fedora /Debrin. VSftpd (Very Secure FTP Daemon) is an FTP server for Linux distributions. Vsftpd is the default FTP server is the Fedora, RHEL, CentOS, Ubuntu, NimbleX Linux distributions. It is not just secure as th
Frank Boros

Download and Install BackTrack 5 R2 GNOME Screenshots - 0 views

  •  
    This example shows, how to install BackTrack 5 R2 GNOME edition step by step screenshots. BackTrack 5 is a Linux distribution designed for penetration testers and other security professionals, or those who want to mess with all the best security and penetration testing applications the free software
Scott Beamer

Splunk | IT Search for Log Management, Operations, Security and Compliance - 1 views

  •  
    Splunk is the world's leading software used to monitor, report and analyze live streaming IT data as well as terabytes of historical data - located on-premises or in the cloud. More than 1,850 organizations in 70 countries use Splunk to gain valuable insights from their IT data to improve service levels, reduce IT operations costs, mitigate security risks, and drive new levels of operational visibility.
munna1357

ftp configuration in linux step by step - YouTube - 0 views

  •  
    vsftpd is lightweight, very steady, secure, and quick FTP server for Linux environment. vsftpd powers parcel of intensely utilized FTP administration as a part of the web (counting ftp.redhat.com).  vsftpd likewise bolsters virtual ip, virtual clients, transmission capacity throttling, IPv6, encryption and so on.,  This article gives orderly guidelines on the most proficient method to setup vsftpd on your server from source.
  •  
    vsftpd is lightweight, very steady, secure, and quick FTP server for Linux environment. vsftpd powers parcel of intensely utilized FTP administration as a part of the web (counting ftp.redhat.com).  vsftpd likewise bolsters virtual ip, virtual clients, transmission capacity throttling, IPv6, encryption and so on.,  This article gives orderly guidelines on the most proficient method to setup vsftpd on your server from source.
munna1357

ssh in linux installation step by step & | Package installation of linux | - YouTube - 0 views

  •  
    OpenSSH is a free open source set of PC instruments used to give secure and encoded correspondence over a PC system by utilizing the ssh convention. Numerous individuals, new to PCs and conventions, make a confusion about OpenSSH, they think it is a convention, yet it is not, it is an arrangement of PC projects that utilization the ssh convention.  OpenSSH is created by the Open BSD gathering and it is discharged under Simplified BSD License. A primary element which has made feasible for OpenSSH to be utilized such a great amount among framework overseers is its multi-stage ability and exceptionally valuable pleasant components it has. The most recent adaptation is OpenSSH 6.4 which has been discharged on November 8, 2013.  This adaptation of OpenSSH accompanies numerous new components and patches, so on the off chance that you as of now utilize OpenSSH for directing your machines, I recommend you to do an overhaul.
  •  
    OpenSSH is a free open source set of PC instruments used to give secure and encoded correspondence over a PC system by utilizing the ssh convention. Numerous individuals, new to PCs and conventions, make a confusion about OpenSSH, they think it is a convention, yet it is not, it is an arrangement of PC projects that utilization the ssh convention.  OpenSSH is created by the Open BSD gathering and it is discharged under Simplified BSD License. A primary element which has made feasible for OpenSSH to be utilized such a great amount among framework overseers is its multi-stage ability and exceptionally valuable pleasant components it has. The most recent adaptation is OpenSSH 6.4 which has been discharged on November 8, 2013.  This adaptation of OpenSSH accompanies numerous new components and patches, so on the off chance that you as of now utilize OpenSSH for directing your machines, I recommend you to do an overhaul.
munna1357

Domanin and Network configuration Part 2 step by step - YouTube - 0 views

  •  
    This Linux instructional exercise covers TCP/IP organizing, system organization and framework design nuts and bolts. Linux can bolster various system gadgets. The gadget names are numbered and start at zero and tally upwards. For instance, a PC running two ethernet cards will have two gadgets marked/dev/eth0 and/dev/eth1. Linux system arrangement, administration, observing and framework devices are secured in this instructional exercise  All the enormous, userfriendly Linux dispersions accompany different graphical apparatuses, taking into account simple setup of the PC in a nearby system, for associating it to an Internet Service Provider or for remote access. These devices can be begun up from the charge line or from a menu:  Ubuntu setup is done selecting System->Administration->Networking.  RedHat Linux accompanies redhat-config-system, which has both a graphical and a content mode interface.  Suse's YAST or YAST2 is a holding nothing back one design device.  Mandrake/Mandriva accompanies a Network and Internet Configuration Wizard, which is ideally begun up from Mandrake's Control Center.  On Gnome frameworks: elf system inclinations.  On KDE frameworks: knetworkconf.  Your framework documentation gives a lot of guidance and data about accessibility and utilization of apparatuses.  Data that you should give:  For interfacing with the nearby system, for occurrence with your home PCs, or at work: hostname, domainname and IP address. In the event that you need to set up your own particular system, best do some all the more perusing first. At work, this data is liable to be given to your PC consequently when you boot it up. If all else fails, it is better not to indicate any data than making it up.  For interfacing with the Internet: username and secret key for your ISP, phone number when utilizing a modem. Your ISP generally naturally doles out you an IP l
  •  
    This Linux instructional exercise covers TCP/IP organizing, system organization and framework design nuts and bolts. Linux can bolster various system gadgets. The gadget names are numbered and start at zero and tally upwards. For instance, a PC running two ethernet cards will have two gadgets marked/dev/eth0 and/dev/eth1. Linux system arrangement, administration, observing and framework devices are secured in this instructional exercise  All the enormous, userfriendly Linux dispersions accompany different graphical apparatuses, taking into account simple setup of the PC in a nearby system, for associating it to an Internet Service Provider or for remote access. These devices can be begun up from the charge line or from a menu:  Ubuntu setup is done selecting System->Administration->Networking.  RedHat Linux accompanies redhat-config-system, which has both a graphical and a content mode interface.  Suse's YAST or YAST2 is a holding nothing back one design device.  Mandrake/Mandriva accompanies a Network and Internet Configuration Wizard, which is ideally begun up from Mandrake's Control Center.  On Gnome frameworks: elf system inclinations.  On KDE frameworks: knetworkconf.  Your framework documentation gives a lot of guidance and data about accessibility and utilization of apparatuses.  Data that you should give:  For interfacing with the nearby system, for occurrence with your home PCs, or at work: hostname, domainname and IP address. In the event that you need to set up your own particular system, best do some all the more perusing first. At work, this data is liable to be given to your PC consequently when you boot it up. If all else fails, it is better not to indicate any data than making it up.  For interfacing with the Internet: username and secret key for your ISP, phone number when utilizing a modem. Your ISP generally naturally doles out you an IP l
Konstantinos

Tor Project: Anonymity Online - 0 views

  •  
    Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.
  •  
Frank Boros

How to install Lighttpd with PHP5 and MySQL on Ubuntu 12.04 - 0 views

  •  
    Lighttpd web server is an excellent open-source tool designed for speed with all the essential functions of a web server. Lighttpd is a secure, fast, standards-compliant and very flexible web server designed for high-performance environments. It has a very low memory footprint compared to other webs
seth kutcher

Two Thumbs Up For Computer Assistance Services - 2 views

I am so happy for the computer assistance that Computer Assistance Online gave me. They provided me with precise and fast solutions to my computer problem. Their computer specialists really know wh...

computer assistance

started by seth kutcher on 06 Jun 11 no follow-up yet
cecilia marie

Virus Protection Software - 1 views

My files are often lost if not corrupted in my disk drive, and sadly, those where important documents. Sometimes, I fail to backup all my files, that is why, by the time it is corrupted, I am left ...

virus protection

started by cecilia marie on 09 Sep 11 no follow-up yet
1 - 17 of 17
Showing 20 items per page