General :: Secure Coping Of Files Through SCP But Without SSH

Sep 23, 2010

If a user want secure coping of files through scp from one system to another system then how this can be done. This user have only been granted securing coping of files through another system but without ssh.

View 5 Replies


ADVERTISEMENT

General :: Data Lost While Coping Files / Get Them Back?

Dec 8, 2010

A directory /test/test1 is created & under /test1 there are some files & subdirectories with data in it. I had copied the files (text & script files) with command as,

cp -irv /test/test1/.* /test as per the requirement but what i see in destinarion i.e, /test that no files or directory has been copied in /test & the files/directories is also removed from source i.e, /test/test1

so my query is how can i get the files/directories back with data?

View 6 Replies View Related

General :: Directory Is Not Coping

Nov 19, 2010

Directory is not coping totally i tried 3 types, those are.

1. by rsync command to take backup

it was running in b/w that process is automatically killed.

2. by copy command

when i am trying with out recursion option ,it gives an error like directory is not copied.at that case i used -r option

this time also the process was killed in bitween.

3. i tried directly copy/paste process.

this process is just stopped and it didn't continue .

regularly ,i am using that rsync command.it worked fine .from 4 days i am facing this problem

at these three times ,when the process stopped ,the kernel failure window appears at right side bottom of the display

actually i want that backup of that directory regulerly.how can i take that.

View 3 Replies View Related

Ubuntu :: Coping The Evolution Contacts (10.04)

May 19, 2010

Where is the file with Evolution contacts? I want to copy this file from one computer to other.

View 2 Replies View Related

Ubuntu :: Coping /home To Different Hard Disk?

Feb 26, 2011

from: [URL]

Q. - "Next we will copy all files, directories and sub-directories from your current /home folder into the new partition: sudo rsync -axS --exclude='/*/.gvfs' /home/. /media/home/."

I would like to know what the dots in /home/. and /media/home/. mean? Or to put it other way; will the command bellow copy my /home to /media/home (on different hard disk)?

sudo rsync -axvS --exclude='/*/.gvfs' /home/ /media/home/

View 3 Replies View Related

Red Hat :: Secure Folders And Files With Password?

Sep 30, 2010

I need know to protect particular file or folder with a password can any tell how to do that in RHEL 5

View 2 Replies View Related

Software :: Coping With MS Outlook - Getting It To Launch, Run Export Rules And Exit?

May 7, 2011

I often find myself working in environments that force MS Outlook down my throat. I know there must be others here who have dealt with this frustration, so I'm hoping to get a convenient workaround.My strategy so far has been to make an Outlook rule that immediately copies every email to a PST file (for export). This is the first rule that runs. The pst file is kept directly on network filespace, so the linux and windows sides can both get at it. On the linux side, a pst to mbox converter runs, and then emacs can access the mbox mail.

It all works, but it's cumbersome. The script must periodically move the PST file and immediately copy an empty PST file in its place. I would have appreciated it if Outlook would only handle the file when adding mail to it. The problem is, after I replace the file with an empty PST file, Outlook pukes, and even deactivates the rule for copying emails. So I must manually close Outlook, empty the PST file, then relaunch Outlook just to run the rule to copy email.Is there a way to use cygwin or something to launch outlook in the background, run outlook rules, and exit, every 10 minutes?

View 1 Replies View Related

SUSE :: Secure Delete Of Trash Files?

Mar 19, 2010

i have an issue due to some high security requirements. what i want to do is to remove the files in trash folder permanently from the memory so that they cannot be recovered again. am aware of the "shred" command but i dont know if it can reach to files that are already in trash.I have found a solution but it requires to fill the whole unused memory with a file that consist of some ramdom bits and than deletes it:

dd if=/dev/zero of=zero.small.file bs=1024 count=102400
shred -z zero.small.file
cat /dev/zero > zero.file

[code]...

View 6 Replies View Related

Fedora :: Access Files Remotely But Remain Secure?

Mar 15, 2010

I would like to be able to access my data file that reside on my Linux machine at home from the Internet but I don't want to open any "doors" for lack of a better word that will compromise the security of my files. I am running F11 and I am using cable broadband and a Linksys router.I have been able to get ssh working with OpenSSH while I am at home but I don't really need or want to ssh remotely, I would rather setup what I think is called an ftp. I just want to be able to up and download files to my Linux machine.

View 6 Replies View Related

Security :: Ways To Secure Sendmail Or Secure Alternatives To Send Mail

Dec 1, 2010

I'm an Oracle DBA and started working for my current employer about 4 months ago. This past weekend an alert re: FS space brought my attention to /var/spool/clientmqueue (full of mail re: cron jobs) and the fact that sendmail is not running on our Linux servers.I'm told that the IT security team deemed sendmail too vulnerable so we don't run it.Aside from FS filling up and missing notification of issues with crontab entries, I'm concerned that we may be missing notification of potential issues. In other Unix/Linux environments I've seen emails from the print daemon when it experienced problems with specific jobs.

Are there other Linux facilities aside from cron and lpd that use email to advise the users of possible issues? Are there ways to secure sendmail or secure alternatives to sendmail? My primary need/desire is to make sure that emails regarding issues on the server get to the appropriate users. Secondary goal would be to have the ability to use mailx to send mail out. There is No need/desire to receive mail from outside.

View 1 Replies View Related

Ubuntu Security :: Secure Delete/Shred Files And Folder?

Jun 27, 2010

I don't use the Trash bin because it does not really delete things,speaking from a security point Instead, I gotten used to 'shred' and 'secure-delete' .But to move around files, cut-n-paste is very handy.And I was wandering if items from the Clip get stored somewhere ?i realize that they get overwritten again and again in the clipboard but do they also get stored somewhere else?

View 9 Replies View Related

Ubuntu One :: Android - Files Feature - Secure App Launch With PIN Entry

Sep 1, 2011

I'm a member of ubuntuone-android-hackers team on Launchpad, I work on Ubuntu One Files app. If you would like to see new features in the app, you can post your ideas here. I think the forums is a good and comfortable place to share ideas. We have already received quite a lot of requests via e-mail. Most notably, these have been already requested:

- secure app launch with PIN entry
- preserve folder structure when auto-uploading files
- real sync (i.e. reupload a file, that has been modified; sync down favorite folders; etc)

We continue to fix bugs and improve on what we already have, this is just to give you a place to share ideas on new features. We will select the best we can take on given available time and resources. I can't guarantee we'll implement them, I can guarantee however that we're doing our best and I'll be keeping track of this official thread.

View 4 Replies View Related

Ubuntu Security :: Secure-delete Won't Work On Larger Files / Sort It?

Sep 16, 2010

I'm trying to clean a hard drive and I'm using secure-delete but it just stands there and takes cpu power but nothing happens, I used -r switch first and nothing, so I tried it on single files, small pictures worked as intended but a simple 50MB MPG file just stands there as well and nothing happens.

I left it running for 24 hours and nothing happened but the cpu was working at 90-100% all the time :/

Any one know what's wrong? I'm using 10.04 UNR

View 9 Replies View Related

Ubuntu Security :: HD Crashed, No Boot, Some Sectors Read, Access Secure Files?

Jun 17, 2011

I was running a 2-partition hard drive, Windows Vista (lamentably) on one partition, and the other running Ubuntu. I began having trouble with the Vista partition, so I attempted to move as many of the files that I really wanted to keep as possible over to the Ubuntu partition, and then reformat and reinstall the Vista partition. As a result, I could no longer boot to Ubuntu, and I consistently got errors back from everything that I tried on the Vista partition.

The only way that I can now access anything on the hard drive is to insert the Ubuntu install disk, go into trial mode, then mount the partition. At long last, here is the problem: Is there anyway to possibly make the partition bootable again so that I could burn the files to a disk? From trial mode I can get to a number of the files on the mounted partition, HOWEVER, they are secured with the username and password of my user account on that partition. Is there any way that I can access the files from the trial mode by entering my username/password?

View 2 Replies View Related

Ubuntu Installation :: Crypt Keeper On Natty Narwhal - Unable To Access Secure Files?

May 13, 2011

After upgrading to Natty Narwhal my Crypt Keeper app will not launch. I am now unable to access secure files. Has anyone had this issue after their upgrade to Natty Narwhal? If so, How were able to resolve this issue.

View 2 Replies View Related

General :: Setting Up Secure Ftp

Aug 3, 2011

setting up secure ftp on linux

View 3 Replies View Related

General :: How To Properly Secure Computer

Apr 21, 2011

there are different methods for securing based on home versus professional computers. My questions generally pertains to securing home desktops, but professional protection is definitely welcome :) Knowledge is power. Ever since moving to the wonderful world of Linux a couple years ago, I never even really thought about security. Seeing as most low-life scum make viruses for Windows machines seeing as they're more abundant.But how do I know if I'm safe/secure from anyone who want's to get at me or my stuff. I know that anyone who is determined enough to get in will, there's no question about that. But what steps can I take to ensure I'm protected from things like rogue root shells and automatic attacks? Also, is there a sort of built-in firewall/antivirus in more Linux distros?

I know this question is quite broad seeing as there are tons of ways someone could compromise your system, but maybe you could share what you did to make sure you were safe.I decided to not allow root login via ssh and to change the port is listens on to something random. Hopefully this a step in the right direction. Currently looking at iptables and shutting down services.

View 5 Replies View Related

General :: Secure Erase Of CF Card Over USB?

Aug 9, 2011

I have a CF card I'd like to erase. My CF card reader is connected to my Linux machine via USB. How do I do a secure erase (i.e., the ATA Secure Erase functionality) of the CF card?

I have tried hdparm --security-erase NULL /dev/sdc, but I get an error: ERASE_PREPARE: Invalid exchange. In fact, any hdparm command gives me the same error:

# hdparm -I /dev/sdc
/dev/sdc:
HDIO_DRIVE_CMD(identify) failed: Invalid exchange

I read somewhere that hdparm can't do an ATA Secure Erase of a drive that is connected over USB. Is this true? I tried using sdparm, but sdparm doesn't seem to have the capability to send the ATA Secure Erase command to the CF card. So, what is the proper way to do this?

View 1 Replies View Related

General :: Secure Screenlocking With X And Tty Login

Aug 14, 2011

I choose not to run a login manager on my systems, instead opting for a tty login and then invoking xinit manually (slightly long story, it makes my life a lot easier to have a bunch of environment tweaks that my login shell sets up and has the rest inherit), but this leaves me with a security issue if someone else comes upon my PC, because even if I've locked my X session they can switch to a tty and kill my X session, dropping back to a shell.

I can either

Start running xinit; logout (which still has a race condition issue, if they get another Ctrl+C in before logout is invoked it'll give a shell) Try to disable the tty switching keys in X Wrap xinit in something to catch and ignore the signal from the Ctrl+C

View 1 Replies View Related

General :: Hdparm Secure Erase

Jan 11, 2011

can hdparm do secure erase on just a partition or does it have to be the whole drive?

View 5 Replies View Related

General :: Secure VNC Over SSH Error - RHEL 5.5

Mar 7, 2011

I am trying to do secure VNC over SSH to a remote linux server from my windows PC, but running into this error.

Error: Unable to connect to host: Connection refused (10061)

View 4 Replies View Related

General :: Access Secure OSX Directory

Dec 20, 2010

My better half spilled some coffee on her 8month old macbook and it decided not to work anymore. Apple says it will cost around $800 or more to fix, we wont be paying that, Ill be finding a logic board or service somewhere online now that our warranty is shot and going that route.But before I send the macbook off anywhere I need to pull some data off the HDD. I was able to plug the HDD into my Linux box(internally, I dont have an external enclosure). I was able to mount the drive and copy the directories I wanted to the HDD on my linuxbox.

But Im unable to to access the directory from the terminal or from the file browser, I get an access denied message. Because I know the username and password for the macbook is there a way I can use that to gain access to the directories?Google got me this far, but when I googled "access locked directory ubuntu" or any variation of that with the terms linux and osx thrown in there for good measure.

View 3 Replies View Related

General :: Cannot Open Secure Sites

Mar 3, 2010

I am using Firefox 2.0.0.8 and Opera.Both the browsers can open all sites except secure sites like, URL>..In Firefox I have checked SSL3.0 and TLS1.0.The default Enforcing mode of the OS I have set to 'Permissive'.

View 6 Replies View Related

General :: Use SSH (Secure Shell) Service?

Jun 11, 2010

I want to learn using SSH (Secure Shell) service in linux and connect to SSH server with PuTTY to test some commands, but I have not worked with it yet;

I have Ubuntu 9.04 on my "Virtual Machine" and my host OS is Win.XP and I have installed "OpenSSH server" and "PuTTY" from the ubuntu repository,

Is this action rational? I mean I want to connect from PuTTY on linux(on VM) to the SSH Server on linux?

(Meanwhile, I have no work with the host Windows and just wanna test it on the linux!)

where should I see the "Host Name/Ip Address" of the SSH Server to enter in the PuTTy's dialog? In windows we can use "ipconfig" command to see the IP Addresses, but I don't know what is the command in linx for this purpose?

use SSH Service in ubuntu correctly

View 1 Replies View Related

General :: Secure Ubuntu On A Laptop?

Jun 13, 2011

I loaded Ubuntu on a Windows OS laptop and am finally figuring out how to connect wireless. Before I do what can I do that will protect me? I am told I don't need anti-virus. Is this accurate? Also, I want a really secure firewall...not one that an experienced hacker could see and just hop over.

View 3 Replies View Related

General :: Secure Shell/terminal For Ubuntu?

Jul 22, 2010

There are a couple commands I want to run in a terminal that require me to provide my password. I really don't want those commands ending up in any kind of history or anywhere else where they could be seen by someone after the command was run. Are there any shells/terminals for Ubuntu that I could use (or options to bash/zsh/etc) that would give me a secure environment where I don't have to worry about my history being kept?

View 3 Replies View Related

General :: Secure Screen For Use With A Menu Script?

Dec 10, 2010

I'm launching screen with the following command, inside a shell script that is set as a user's shell to keep them from escaping.

screen -dRRq -S ${USER}_MC -s $HOME/runthis.sh

Is there a way to secure screen, to keep the user from being able to even use the escape sequence, or at worst, prevent them from running commands like exec?

Edit: It's not that the user should have access to an actual command-prompt shell. I only want them to be able to run a single program that runs persistently, and as far as I know screen is the easiest way to do that. However, getting out of this is as easy as C-a : exec bash.

Right now I've just unbound most of the keys using .screenrc (especially colon), I just want to make sure I'm not missing something easier.

View 2 Replies View Related

General :: Secure Distro That Sends Traffic Through Tor?

Aug 2, 2011

I'm looking for a live Linux distro that is secure and preserves my anonymity online. For what I need, Tor seems to do the job - but such software requires configuration that someone who is not knowledgeable in how it works might find difficult. I was looking at 'Lightweight portable security' but it does not specify whether it sends all traffic through Tor. Does anyone know more information about it and/or any other such live Linux distro?

View 3 Replies View Related

General :: Cannot Connect To Secure Network (wpa_supplicant)

May 13, 2010

i believe it is a wpa_supplicant problem. running ubuntu 10.04 on a toshiba netbook. i have my account which cannot connect to internet, wicd returns an error that it cannot obtain ip address. cannot even connect to a unesecure network for that matter. if i switch users to another user and do the quick switch users i can get internet then i switched back to my main account and here i am postings. how do i begin to hunt down the problem logs, settings how do some of you begin to hunt down the cause of this and where it would be located.

View 1 Replies View Related

General :: Proxy Connect To Secure Computer W Key?

Nov 25, 2010

I've been searching for the exact set of tools to accomplish what I need. I was once at a LANparty. I used my webmail account and I think someone stole my password. I realized that the LAN used hubs instead of switches.

So next time, I thought I could run a server at home, which would allow me to connect with SSL (??). Then I would be able to connect to whatever website knowing that I was secure between myself and my home computer. I guess I would need to have a key before a secure connection could be made. Otherwise a "man in the middle" kind of exchange could take place.

So I guess I would need a VPN between myself and my home computer. Then my home computer would act as a proxy to allow me to surf securely. I'm not sure if these are the correct terms to use. Does anyone know what type of server I'm looking for?

View 1 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved