Programming :: Encryption / Implementing AIDE On Client Machines?
Aug 22, 2010
I need to implement AIDE on my client machines. The builds on these machine are different, so each workstation will have its own specific db generated through running AIDE initially. It is not good practice to just leave the db on the machine, since an "attacker" would be able to view this information. However, at the same time I do not want to pull back over 100 different aide db's to the ftp server and have an update pull each specifically every time I need to run the check. The plan is to leave the db on the client machine, but encrypt it (using public/private keys). I need to be able to encrypt the file on the client machine. I will use a cron on the client to pull an update (from my ftp server) that runs AIDE. This update needs to be able to decrypt the file, use it running AIDE, then re-encrypt the file on the client.
View 1 Replies
ADVERTISEMENT
Jan 12, 2010
I looking for an algoritm to encrypt some data sent from a c program(client) to a php server(can be in perl or cgi-bin) over the internet. How should i send it in c? Some http call? Or it can be in via a perl script. Then i need some basic algoritm to encrypt it. Any ideas. How do i save the key in the c program? Just something basic so its not clear text. This is not for a bank or visacards etc
View 2 Replies
View Related
May 16, 2011
I would love to be able to use TrueCrypt consistently across all my machines, be they Windows or Linux. As it stands, I can do full-disk encryption with pre-boot authentication only on Windows.
I don't really understand why this is. Are there technical challenges specific to Linux/Mac that make full disk encryption harder? Does anyone know whether TrueCrypt will support this in the near future.
PS. yes, I'm aware that there are other options. My goal is to simplify my life here and use the one tool across all machines.
View 1 Replies
View Related
Mar 18, 2011
When you install sshd and run it with no modifications, then any other machine can connect to your machine without specifying a key. How does this work? Some key is being used, correct? how does the client know what private key to use?
View 14 Replies
View Related
Aug 27, 2009
I'm interested in writing a generational garbage collector in C++. This is for a Python-like programming language project. I have used Boehm's garbage collector before, but I'm worried that it will have noticeable pause times (unacceptable for interactive programs). Since I can't really find any other C++ established GCs out there, I have been thinking of simply writing my own.
However, there are two essential ingredients I need for this:
- Some kind of write barrier mechanism that will notify my collector when something is written to a part of the heap
- A way for me to know the addresses and sizes of the stack, heap and global storage (the root sets)
how to implement write barriers (and how to get the stack, heap and global storage information) on the Linux platform? As an alternative, if you know of C++ GCs other than Boehm, I would also be interested.
View 14 Replies
View Related
Oct 17, 2010
I am working on xlib project to develop text editor without using help from any of toolkit/widgets.I get stuck in scrollbar.I have no idea how they work and developed.It become more difficult as I am using low-level C library - xlib.
View 1 Replies
View Related
Mar 31, 2011
Though I have developed some web applications (automation tools) using PHP which have been primarily meant for Intranet (within the organizations I have worked for), I have paid little attention to SEO (it was not required until now). But now I want to understand how do we go about implementing SEO and where do we fit this mechanism in a system / website?
Do we need any other tools or learn some specific programming /scripting language to achieve it?Will implementing a good SEO yield identical results irrespective of what search engine (be it Google or Yahoo!) is being used by users?
View 1 Replies
View Related
Sep 12, 2010
implementing hamming code in c: Calculating the Hamming Code The key to the Hamming Code is the use of extra parity bits to allow the identification of a single error. Create the code word as follows:
Mark all bit positions that are powers of two as parity bits. (positions 1, 2, 4, 8, 16, 32, 64, etc.)
All other bit positions are for the data to be encoded. (positions 3, 5, 6, 7, 9, 10, 11, 12, 13, 14, 15, 17, etc.)
[code]....
View 2 Replies
View Related
May 13, 2011
i am running linux kernel 2.6.32-30 and my aim is to do packet aggregation in linux,so i created a qdisc simple one like sch_fifo.c and i wanted to put upon the dequeue function but when i attach my qdisct with tc qdisc add dev wlan0 root aggregate my screen just go black and in var/log/messages it says 31 m of stolen memory.graphic perfomance may suffer. can you somebody pls help me. Below is my dequeue function.
static struct sk_buff *aggregate_dequeue(struct Qdisc *sch)
{
struct sk_buff *skb;
struct packet_buffer *packet_buffer = {0};
packet_buffer->size=0;
skb = __skb_dequeue(&sch->q);
[Code]...
View 1 Replies
View Related
Sep 4, 2010
I use rtorrent in slackware. I already tried to use deluge 1.2.3 and even 1.3rc1 and 1.3rc2 but I find them a little unstable. Witch is your favorite? For lot of torrents and maximum encryption?
View 14 Replies
View Related
Sep 12, 2013
I run Wheezy Xfce 64-bit. I went through the Synaptic listings and added Python 3.3.2 and Tkinter for it, and that works fine; but for some reason PyGtk is available only for Python 2.7, not for Python 3.3, unless I'm just using the wrong way to try to find it. Is there a PyGtk available for Python 3.3 in Wheezy, and, if so, how do I install it and then import it once it's installed?
View 1 Replies
View Related
Nov 15, 2010
Options:A double linked list with fixed size character arrays. New nodes will be added when previous ones get filled. Dynamic arrays using realloc(). Linked list has the disadvantage of not having an O(1) search like an array but I think using realloc() will be more dangerous since it moves the whole block to a new location and if the new location is not big enough to hold the whole block, realloc fails !! this case will not occur with the linked list since its nodes are scattered.
View 14 Replies
View Related
Mar 21, 2011
I seek a GNU Common LISP package which implements forkpty(); openpty() would also be a big plus, and login_tty() would be a luxury I could live with.
View 3 Replies
View Related
Oct 11, 2010
I'm working on a problem in which i have to implement the regular sleeping barber problem with multiple (say n) barbers. The code i'm using is this :
#include<stdio.h>
#include<stdlib.h>
#include<unistd.h>
#include<pthread.h>
#include<errno.h>
#include<sys/ipc.h>
#include<semaphore.h>
[Code]...
how to implement the modification? (there are many more such modifications where i'm stuck , but will ask about those later)
View 6 Replies
View Related
Nov 11, 2010
I would like to move some files between two machines and as scp sometimes is not the easiest thing to do. Do you know if there is any gui that makes this remote copy files procedure easier?
View 4 Replies
View Related
Jun 14, 2011
I'm trying to ssh to a client machine which as freeipa client setup Login works great but ssh via GSS.Is there a way to see what's being sent where? I already have the highest debug turned on the ssh side.
View 1 Replies
View Related
Feb 5, 2010
I need to control matrix 5x4 keypad, on a processor
i am doing by making one row low at a time, and keeping all other rows high,
by scaning coloums, the corresponding key value becomes low.
my problems is that it is taking much time to respond, like to make gpio
low to high and high to low...
View 1 Replies
View Related
Jun 14, 2009
I am running NFS and NIS servers in my FC8. Clients are also running FC8. Everything was working fine. I could login remotely to server as well as clients. Suddenly (few days ago) a problem started. I can not login remotely to client machines. I did not do anything. I can login to server remotely, but not the client. When I try to login, it accept password and nothing happens. Also, when I try to login from server to client same thing happens. We share the home directory of the server with client. Another question: there two type of nfs server nfs-user-server and nfs-kernel-server. I just use gui to set up the NFS. I don't know which one I am running. Is there any way to find out which nfs I am running?
View 1 Replies
View Related
Aug 25, 2011
We administer a small lab of Ubuntu 11.04 machines. Users authenticate via NIS to the fileserver, which then uses NFS to mount their /home directory.
From time to time, seemingly at random, the machines will lock up. After about 15 minutes, they will go back to normal.
Switching the machine to the console with/ Ctrl+Alt+F1 doesn't help either - credentials get entered, but there's still a 15 minute wait before any commands can be entered. Some error messages show up at this point about processes that were running timing out. However, the root user can log in immediately (which makes us think that this is only affecting NIS accounts).
Logging in with the root account, we can ping our NIS server, and it responds normally. We can restart the networking and NIS daemons but neither of these help.
We checked the NIS error log in /var/yp/ypserv.log and it is empty.
We used to be running a different version of Ubuntu on the client machines (10.04 LTS), but not on the server.
View 3 Replies
View Related
Jun 20, 2009
i have problem in sending emails using outlook on my client machines i.e XP i am getting the error Relay access denied. i am using fedora 9 as our server. with dovecot and postfix and fetchmail.it was working fine previously .
View 1 Replies
View Related
Feb 15, 2010
I just set up an ubuntu 9.10 server (no desktop environment, command line only) and I'm unable to see my samba share. I followed these instructions. Here are the relevant parts of my smb.conf file: Quote:
workgroup = JASONGROUP
# I un-commented this
security = user
[code]....
View 9 Replies
View Related
May 22, 2011
I am trying to build a file server with RAID 5 over a couple of 1TB HDDs, to serve about 10 client machines using Ubuntu Server. I already own a 22-port switch: HP ProCurve v1810G-24 Switch (J9450A), which I am assuming will do the job. And for the actual server I am thinking of buying: HP ProLiant DL120 1U. Will this hardware suffice, or am I missing something important to get the whole thing running?
View 9 Replies
View Related
Feb 8, 2010
I am encountering this issue:
Samba login/passwd client : why the users id arent the same on every machines?
So the client side config looks like this:
Quote:
/etc/pam.d/ files :
Code:
returns:
Code:
View 4 Replies
View Related
Mar 9, 2011
I am writing a TCP server in C, and the server listens to incoming client connections and accepts them. It then creates a thread to handle the client. The clients are expected to only receive data from my server and not send any data. So if I use a select() call with a recv(), I believe that the recv() will just block forever since there will not be any data coming from the client. If I use a non-blocking recv(), then this will just return a 0 which tells me nothing because the client is not expected to send any data. I am not sure if I have misunderstood some socket concepts, but I need a solution to detect when the client has disconnected so that I can close the socket and stop sending data to the client. As I understand it, simple ACKs etc are not captured by the recv(), and only data sent by the client will cause recv() to return a non-zero value, so I am not sure how to know when the client has disconnected.
View 7 Replies
View Related
Jun 30, 2010
I am trying to find out if there is an existing AIDE package for U10.4.....
View 3 Replies
View Related
Dec 16, 2010
I would like to protect my configuration files using opensource tools?
View 2 Replies
View Related
Apr 5, 2010
I am *finally* getting around to rebuilding my file-sharing computer. I'll be sharing files with both Linux and Windoze machines. It's a home network, so there's nothing fancy needed. I know I have to tweak my smb.conf file until I'm satisfied with the features and security. I'm using SWAT and I'm starting with a bare-bones conf file. It's not secure but I can see the server and selected files/directories from my other Linux box.
My really dumb question is, do I have to reboot both the server and the client machines every time I change the SAMBA configuration? I thought I just had to stop and restart the SAMBA service in the SWAT software - but then the server disappears from my client. It looks like I need to reboot both machines for the client to see the server.
View 1 Replies
View Related
Jun 7, 2011
To make aide more secure would i: put the aide binary and database on a read only media, then mount the aide binary copy it onto the filesystem(where?), then alter /etc/aide.conf so that DBDIR is a mounted read-only media, then run aide? BTW i'm not looking for military/bank security level(I'm willing to accept less)
View 1 Replies
View Related
Jun 24, 2009
How to decrypt a file in openssl which is encrypted in perl using crypt cbc
View 2 Replies
View Related
Jun 21, 2011
I am in the process of looking at file integrity checkers. So far I have found AIDE.
1. What are the ups and downs of AIDE?
2. Is it pretty easy to use?
3. Is there any other open source tools that are better than AIDE?
View 1 Replies
View Related