Security :: How To Configure Rsh Server

Apr 15, 2011

How to Configure rsh Server and where to restrict instances?

View 3 Replies


ADVERTISEMENT

Security :: Configure Server To Block Unsecured VNC Connection?

Jun 23, 2009

securing VNC connections by tunneling the connection over SSH. However, from the server perspective it will still allow an unsecured connections and you're relying on the client to setup up the SSH tunneling. Is there a way to configure the Linux server to now allow connection over an unsecured channel?

View 4 Replies View Related

Security :: Configure Squid Server To Block Anon Proxy Sites?

Jul 22, 2010

I have setup a squid server on Rhel5.4. I would like to know how I can configure my squid server to block anon proxy sites.

View 3 Replies View Related

Security :: Define An Appliance Based On Suse For An Application Server And Web Server Apache - Best Network And Security?

Feb 6, 2010

We are trying to define an appliance based on Suse for an application server and Web server Apache, so we would like to know configuration best practices for network and security, is there any paper/doc about best practices?

View 3 Replies View Related

Security :: Configure IPtables To Only Allow VNC Over SSH

Apr 4, 2010

I am trying to figure out how I can configure IPtables to only allow VNC traffic to an internal server over SSH.

My configuration is WAN < --- > Gateway (Ubuntu 9.10 Server) < --- > Internal Server (that I want to control with VNC over SSH)

View 12 Replies View Related

Security :: How To Configure Logwatch

Mar 4, 2010

how to configure Logwatch? where can I find its config file? I never configure it but I received email everyday from Logwatch@mydomain.com..

View 1 Replies View Related

Security :: Configure IMSpector On My Cent OS Box ?

Apr 29, 2011

I want configure IMSpector on my Cent OS box.

View 4 Replies View Related

Security :: Configure A Spare Pc As A Firewall?

Jul 16, 2010

How do I configure a spare pc as a firewall for my home and what distro would I use?

View 1 Replies View Related

Debian Configuration :: Install A Multi-core System And Configure It To Run Several VMs, One Each For A Firewall, A Caching Proxy Server, A Mail Server, A Web Server?

Jan 25, 2011

I will be relocating to a permanent residence sometime in the next year or two. I've recently begun thinking about the best way to implement a home-based network. It occurred to me that the most elegant solution might be the use of VM technology to eliminate as much hardware and wiring as possible.My thinking is this: Install a multi-core system and configure it to run several VMs, one each for a firewall, a caching proxy server, a mail server, a web server. Additionally, I would like to run 2-4 VMs as remote (RDP)workstations, using diskless workstations to boot the VMs over powerline ethernet.The latest powerline technology (available later this year) will allow multiple devices on a residential circuit operating at near gigabit speed, just like legacy wired networks.

In theory, the above would allow me to consolidate everything but the disklessworkstations on a single server and eliminate all wired (and wireless) connections except the broadband connection to the Internet and the cabling to the nearest power outlets. It appears technically possible, but I'm not sure about the various virtual connections among VMs. In theory, each VM should be able to communicate with the other as if it was on the same network via the server data bus, but what about setting up firewall zones? Any internal I/O bandwidth bottlenecks? Any other potential "gotchas", caveats, issues? (Other than the obvious requirement of having enough CPU and RAM).Any thoughts or observations welcome, especially if they are from real world experience in a VM environment. BTW--in case you're wondering why I'm posting here, it's because I run Debian on all my workstations/servers (running VirtualBox as a VM for Windows XP on one workstation).

View 14 Replies View Related

Server :: Configure Internal Zimbra Server To Use External Server To Send Mails?

Feb 16, 2010

I have got a running mail server on CentOS5.4 Final using Zimbra free edition. . Assume that domain is organization.com.local And it is running fine with users created and bugzilla running on the same machine can send mails using this server. But it can obviously send messages to the internal users. There is this option to configure it to use external mail server to send mails outside the network but my external smtp server needs an authentication.Is it possible to configure it this way to use my external server to send mails from internal domain to say gmail?

View 15 Replies View Related

CentOS 5 Server :: Automation Of Ftp Server \ Configure A FTP Server Where Upload And Download Files?

Jan 8, 2011

i have been trying to complete the following project1) Configure a FTP server where we can upload and download files.........2) server must run at 9 pm & stop at 9 am automatically ............although the first task was easy ,i have no idea how to accomplish the 2nd task(not to mention I'm a new user)

View 5 Replies View Related

Security :: Configure Syslogd To Email Reports?

Mar 13, 2011

I'm going through the linux hardening checklist, and the only bit I'm having trouble with is how to configure syslogd to email daily reports to my email. my mta is postfix

How do I do this? Or should I ask... where is the HOWTO?

View 2 Replies View Related

Security :: Configure PAM To Use The Remember Option For The Password?

Jan 7, 2010

How do I configure PAM to use the remember option for the passwd. It should remember the last 10 passwords and shouldnt allow the user to use the same old passwords. Here is what I have configured but doesnt work

#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.
auth required pam_env.so
auth required /lib64/security/pam_tally.so deny=2 onerr=fail even_deny_root_account unlock_time=5
auth sufficient pam_unix.so likeauth nullok

[Code]...

View 1 Replies View Related

Security :: Configure Deny.hosts For Opensuse 11.1?

Sep 7, 2010

I just downloaded the DenyHosts2.6python2.5.rpm for deny.hosts from sourceforge and would like to set it up. I normally use fish://, smb:// and ftp:// on the boxes on my lan. I already have files called hosts.allow and hosts.deny in the /etc folder. Will the rpm configure hosts.deny when first run?

View 1 Replies View Related

Server :: Configure Redhat Enterprise Server 4 As Router And Proxy Server

May 18, 2010

Im new in linux i want to configure my redhat machine as both router and transparent proxy!

View 1 Replies View Related

Fedora Security :: Configure See To Protect The Contents Of A Folder?

Jul 28, 2011

im currently trying to configure SE Linux policy for a folder so that only my user with root privileges can access it and not just root but i don't know the commend to run on the folder to change its permissions

View 4 Replies View Related

Ubuntu Security :: Setup And Configure Snort 2.8.5.2 On A 10.10 System?

Dec 11, 2010

does anyone know of a good tutorial on how to set up and configure snort 2.8.5.2 on a ubuntu 10.10 system.I have been trying to set up snort and have run into alot of problems setting up the config file and the rules. It works in sniff and packet log mode but i cannot seem to set up IDS mode correctly. There is alot of different info on the net but not much help. There seems to be alot of work involved in setting this up which i do not mind provided i can find the proper documentation to configure the set up.

View 9 Replies View Related

Ubuntu Security :: Configure To Log In With A Password Fingerprint And Usb Token?

Mar 24, 2011

First off is there any way to configure ubuntu to log in with a password, fingerprint and usb token? Secondly what is the difference between the standard home folder encryption and the alternate install encryption?

Thirdly is it possible on new external hard drives that incorporate thumb scanners to install truecrypt on these? Fourthly does anyone here on ubuntu forums use lastpass with the 'yubikey' device-does it work well on ubuntu? And fifthly are ironkey usb keys worth the money or are they a scam?

View 7 Replies View Related

Ubuntu Security :: Configure Firewall And User Rights?

Apr 27, 2011

I am novice user of linux. I need to know how to configure firewall so my system cant be compromised...In windows my system was greatly compromised. keyloggers were installed without my approval and my desktop was taken on remote. What should I do so without my knowledge no software can be installed and i can close all ports and only open which ever port is required to open. What should i do so my desktop cant be taken on remote?How do I configure user rights ? So except me no one can install any software. I will have another general user id for internet surfing

View 3 Replies View Related

Security :: Configure Shorewall To Allow Syslog Messages From Router?

Jan 29, 2011

I have my system set up to where the router(dd-wrt) will send it's syslog messages to my Linux PC system. I am using shorewall as my firewall. I have two questions: How can I configure shorewall to allow the messages from my router? If I use my router IP address to allow the messages to come through the firewall, will this be a great security risk as anything from the internet can come through on that router ipaddress?

View 1 Replies View Related

Security :: How To Configure Guest Account (for Computer Repair)

Jan 26, 2011

I spill my soda on my keyboard and ended up in a 4 day war with my pc.Now my tab, capslock, left shift, and down vol no longer works. I'm going to take it into the shop in the next couple of days to probably replace the keyboard. (If only lenovo kept the easy access keyboards like ibm had on the thinkpads). Something tells me that they will want to log in and test out the keyboard. So I created a guest account with a simple password. I changed my normal user home dir to 770 permissions and changed guest's shell to /bin/rbash. (both found in other posts.) Is there anything else I should do to secure the computer while it is in the shop?[I use su, sudo isn't configured to work (its a dependency so I can't uninstall)]. I have a pretty decent root password.

View 10 Replies View Related

Security :: Configure Squid Active Directory And Dansguardian?

Jul 19, 2009

I have configured squid with AD. It is working fine. Now I want to use dansguardian with squid for web filtering on group bases, what should I do. What configuration i have to do in squid for dansguardian and all my users in AD also authenticate with dansguardian and also how I use dansguardian.

View 1 Replies View Related

Fedora Security :: Configure Firewall And Software Plus User Rights?

Apr 27, 2011

I am novice user of linux. I need to know how to configure firewall so my system cant be compromised...In windows my system was greatly compromised. keyloggers were installed without my approval and my desktop was taken on remote.What should I do so without my knowledge no software can be installed and i can close all ports and only open which ever port is required to open. What should i do so my desktop cant be taken on remote?How do I configure user rights? So only root and one admin can install softwares and no one else.

View 5 Replies View Related

Ubuntu Security :: Configure Ufw To Drop Icmp Echo Requests?

Jul 12, 2010

I've been trying to configure ufw to drop ping requests for a couple days now, and I can't figure it out. I've tried a couple different methods in some different guides, still nothing. Anyone know how to do this?

View 4 Replies View Related

Security :: Configure RHEL 5.5 Syslog To Accept SNMP Traps?

Jul 14, 2010

Is it possible to configure the RHEL 5.5 syslog to accept SNMP traps? That is I want to use a central logging server to pick up other systems syslogs, and SNMP messages from systems that cannot use remote syslog functions.

View 3 Replies View Related

Software :: Setting Up CUPS / Configure Cupsd.conf For Security?

Apr 21, 2010

Using Debian Lenny.I am new to printing with Linux and would like some help with CUPS. I have CUPS set up to work with my printer.I read through the documentation, but still have some problems.

1. How should I configure cupsd.conf for security?

Quote:

Portwalling

* By default, cups will listen on every interface. Unless you want to offer your printer to the world, you must block this.Although you can firewall this (and that is a good idea anyway),you can also not have cups listen on your Internet connection.This also prevents any possibility of a root exploit from the Internet. Of course, you still have internal crackers to worry about...

* In cups.conf, comment out the lines:
Port 80
Port 631
* Replace them with:
Listen 127.0.0.1:631
code....

How do I create a symbolic link between programs?When I opened Xpp it said Printer:destination not available.

4. Can I adjust the text size on text, pdf or html files with Cups or do I need another program for this?

View 3 Replies View Related

Server :: Configure Email Server In Cloud Server Environment?

Jun 15, 2011

I have installed the Apache, PHP and MYSQL in the rackspace cloud server environment. Can anyone please guide me How can I configure email server in that with postfix or some other with multiple domain.

View 3 Replies View Related

Security :: Configure Open Source Firewall On Office For Websites Blocking?

Apr 21, 2011

I want configure open source firewall on my office for websites blocking and bandwidth monitoring.

which is the beast free open source firewall..

View 9 Replies View Related

Ubuntu Security :: Installing LAMP Server On Laptop - Security?

May 8, 2011

I'm concerned about security of having a LAMP server on my laptop as having any server makes the system less secure. However, if I were to create a new partition and install a lamp server on that and only use it when offline, would the security of my main partition be affected at all?

View 3 Replies View Related

Ubuntu Security :: Best Solution To Protect Server From Security Threats?

Jul 22, 2011

I've recently been running a game server from my desktop, as well as a web page to accompany it.I use the ports 80/8123(HTTP)/5900(VNC)/50500(GAME)/5839(ADMINISTRATION).What's the best solution to protect my server from security threats? On a side note, I plan on adding a MySQL server later, but I want to keep it local only.

View 9 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved