Find the answer to your Linux question:
Page 46 of 83 FirstFirst ... 36 42 43 44 45 46 47 48 49 50 56 ... LastLast
Threads 901 to 920 of 1646

Forum: Security

Post here for help with Linux security issues: antivirus, firewalls, encryption, vulnerabilities, etc

  1. Sticky Thread Sticky: A short guide to Linux security

    Here at linuxforums.org we are often asked about the potential threat of a virus or malware attack. This short guide is designed to answer some of...

    Started by fingal, 02-25-2006
    • Replies: 1
    • Views: 52,419
    01-11-2010 Go to last post
  2.  
  1. Demonstrating MAC using SELinux, Metasploit and DVL

    I would like to demonstrate how mandatory access control(implemented using SELinux) can be used to avoid most of the attacks.I have metasploit...

    Started by nengo, 10-29-2007
    • Replies: 1
    • Views: 2,428
    10-29-2007 Go to last post
  2. vpn vs https

    Hi, I had a question as to when do we go for vpn and when do we go for https. Both of them provide authentication and encrypted data transfer. So...

    Started by siddhi_div@yahoo.co.in, 10-25-2007
    • Replies: 1
    • Views: 3,050
    10-26-2007 Go to last post
  3. Openssl and L2TP

    I would like to use my netscreen 5xt to act as an L2TP server using the windows L2TP client. I am very new to PKI cert based VPN so I dont know much...

    Started by texanmutt, 10-24-2007
    • Replies: 0
    • Views: 1,675
    10-24-2007 Go to last post
  4. Disable Security in Debian/Ubuntu

    Hi, I am teaching a class on Computer Security and am hoping to disable all the default security settings that come standard on Debian. Basically,...

    Started by skm376, 10-19-2007
    • Replies: 0
    • Views: 2,170
    10-19-2007 Go to last post
  5. Danger of NOT updating the Kernel?

    Hello, at the moment I run 2.6.22.9-61 kernel in FC6. And well I did add the truecrypt module. What is the Danger of NOT updating the kernel?...

    Started by RobinVossen, 10-16-2007
    • Replies: 3
    • Views: 885
    10-19-2007 Go to last post
  6. issue with SSH Server

    Hi, wonder if anyone might be able to help me here. I'm new to SSH. I have just installed SSH server on one of our machines. The machine is...

    Started by associates, 10-17-2007
    • Replies: 0
    • Views: 694
    10-17-2007 Go to last post
  7. Squid proxy hardening.

    I have some questions about squid security. Firstly, my acl list is posted in the attachment. There is a line. acl manager proto cache_object ...

    Started by Felarin, 10-13-2007
    • Replies: 1
    • Views: 2,665
    10-14-2007 Go to last post
  8. Can we limit login failures from an IP address

    I searched but couldn't find anything like this. We get regular "dictionary attacks" on our ssh ports. People or programs trying various...

    Started by areeda, 10-04-2006
    2 Pages
    1 2
    • Replies: 11
    • Views: 8,631
    10-10-2007 Go to last post
  9. SELinux implementation with virtual machines

    I am working with SELinux for my final year project.My objective is to show how to prevent zero day exploits with SELinux.I am planning to use...

    Started by nengo, 10-08-2007
    • Replies: 1
    • Views: 857
    10-08-2007 Go to last post
  10. Tunnel VNC over SSH

    Hey, I have been working on this for quite some while.. Googled, tryed examples. But for some reason i just dont get it. I need to connect with a...

    Started by RobinVossen, 10-04-2007
    • Replies: 8
    • Views: 18,207
    10-06-2007 Go to last post
  11. Transparent Router/Firewall help needed!

    Hi, i am currently trying to make a router firewall that will be transparent and redirect all dns requests to opendns. I have decided to use a...

    Started by sdolin, 09-29-2007
    • Replies: 1
    • Views: 2,967
    10-06-2007 Go to last post
  12. chroot gdm

    Hello all I have been looking for quite a while now about chrooting info. I found out (almost) how to chroot a shell. But now I need to chroot the...

    Started by RobinVossen, 10-01-2007
    • Replies: 2
    • Views: 2,530
    10-05-2007 Go to last post
  13. Is this safe?

    I have been working on a Project for Quite a while now. And well I need to know for sure that this is safe.. So well I want your Opinion on this. ...

    Started by RobinVossen, 10-02-2007
    2 Pages
    1 2
    • Replies: 10
    • Views: 1,147
    10-05-2007 Go to last post
  14. Shadow File

    In what encryption way is the Password saved in the shadow file? Since well, I have 3 users with same password. And the Hash is Diffrent every 3...

    Started by RobinVossen, 10-03-2007
    • Replies: 2
    • Views: 2,206
    10-03-2007 Go to last post
  15. SELinux

    I have just decided to learn SELinux and to demonstrate how to use it for my final year project. My main problem comes in the implementation...

    Started by nengo, 09-30-2007
    • Replies: 2
    • Views: 668
    10-02-2007 Go to last post
  16. turning off and on the kids internet access.

    # ============================================================================= # block kids : nate 23: tim d9: bob 78: rae 2f: #...

    Started by rharvey, 09-30-2007
    • Replies: 3
    • Views: 789
    10-01-2007 Go to last post
  17. SSH = Permission Denied

    While on the console, I am able to login and su - to root, as root, however, I try to access another machine on the network via ssh and given a...

    Started by mjc, 09-25-2007
    • Replies: 1
    • Views: 16,043
    09-26-2007 Go to last post
  18. ebtables package delivered with standard distros?

    Is the ebtables package delivered in any standard distros? The page in sourceforge claims that is is standard with Linux 2.6 and higher, but it is...

    Started by haral, 09-19-2007
    • Replies: 0
    • Views: 630
    09-19-2007 Go to last post
  19. Problem on running anonymous proxy

    Hi folks, Ubuntu 7.04 amd64 I have "SwitchProxy Tool 1.4.1", the addon of Firefox, installed and played around with it. SwitchProxy...

    Started by satimis, 09-19-2007
    • Replies: 0
    • Views: 967
    09-19-2007 Go to last post
  20. Question GPG file decryption and encryption without adding the key to the ring.

    Hi The Linux implementation of pgp, the GnuPG looks into the folder ~/.gnupg for the keys to encrypt or decrypt. Since the program i'm running to...

    Started by gjwilson, 09-18-2007
    • Replies: 0
    • Views: 821
    09-18-2007 Go to last post

Page 46 of 83 FirstFirst ... 36 42 43 44 45 46 47 48 49 50 56 ... LastLast

Thread Display Options

Use this control to limit the display of threads to those newer than the specified time frame.

Allows you to choose the data by which the thread list will be sorted.

Order threads in...

Note: when sorting by date, 'descending order' will show the newest results first.

Icon Legend

Contains unread posts
Contains unread posts
Contains no unread posts
Contains no unread posts
More than 15 replies or 150 views
Hot thread with unread posts
More than 15 replies or 150 views
Hot thread with no unread posts
Closed Thread
Thread is closed
Thread Contains a Message Written By You
You have posted in this thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •