Security :: Software To Measure The Entropy Of Random Data

Sep 22, 2010

Once random data is obtained by means other than a pseudo-random number generator, what software is available to measure the entropy or quality/randomness of the data?

View 3 Replies


ADVERTISEMENT

General :: Does 'urandom' Share The Same Entropy Of 'random'

Jun 10, 2010

Does the entropy pool /dev/random used the same to /dev/urandom?

I want to

mknod /dev/random 1 9

to replace the slow random, I think the current entropy is randomly enough, if urandom is based on the same entropy, and all succeed random numbers are generated based on that entropy, I don't think there'll be any vulnerable.

View 2 Replies View Related

Security :: View Random Data And Zeroes On A Hard Drive?

Mar 9, 2011

I want to view a hard drive and see if it has all zeroes, how would I do this? I want to view a hard drive and see if it has all random data, or random data mixed with zeroes. How can I do this? I prefer to do all this in linux if possible without a gui...so looking for any cli tools to view with.

View 5 Replies View Related

Security :: SSH Not Working After Ssh-keygen Due To Lack Of Entropy?

Aug 25, 2010

My /proc/sys/kernel/random/entropy_avail went from 2200 to <200 after ssh-keygen. The generated key pairs also doesn't work (ie I'm asked to provide a password). Anyone knows what is the minimum before and after entropy number I should see in order to have the keys generated properly?

View 8 Replies View Related

Fedora Security :: Unknown Software Sending Data On Random Ports

Jun 1, 2009

I just discovered that my server is sending huge amount of data out at about 1Mbps. My immediate thought was the deluge bittorrent client, however it is supposedly not running (and a check confirmed its total active torrents was set to 0). I turned off the network and went in to Firestarter to set the outbound traffic to restrictive, turned on network again and no more data was sent. A look in Firestarter / Events showed a long list of random ports being used (see further down). How can I identify what program is sending all the data?

In Firestarter it doesn't really say much more than the port. Not sure if it is some misconfigured program or a malware/virus. I just got my ADSL connected a few days ago, and before that I used a mobile broadband (3G) as I just relocated. During the period I used the 3G the server might have been without firewall for a few days and it was also at this time I discovered an increase in network traffic (but I didn't really pay much attention at that time). I am running Fedora 10.

List of events from firestarter, my server is 192.168.1.100:
Time:Jun 1 16:48:12 Direction: Outbound In: Out:eth1 Port:39435 Source:192.168.1.100 Destination:58.208.xxx.56 Length:129 TOS:0x00 Protocol:UDP Service:Unknown
Time:Jun 1 16:48:12 Direction: Outbound In: Out:eth1 Port:6990 Source:192.168.1.100 Destination:112.94.xxx.212 Length:129 TOS:0x00 Protocol:UDP Service:Unknown
Time:Jun 1 16:48:12 Direction: Outbound In: Out:eth1 Port:2973 Source:192.168.1.100 Destination:118.93.42.xxx Length:129 TOS:0x00 Protocol:UDP Service:Svnetworks .....

View 2 Replies View Related

Fedora Security :: What Security Measure's Should Be Taking To Make Box Little Less Vulnerable?

Apr 7, 2009

I'm just curious as to what security measure's I should be taking to make my box a little less vulnerable? I'm still experimenting/playing with Linux, use the net, IM, download this and that and was wondering how secure fedora 10 was out of the box?

View 12 Replies View Related

General :: Measure The Amount Of Usb Data ?

Jan 21, 2010

I would like to measure the amount of traffic my webcam is sending. What is the best way to do this? I tried iostat command, but i do not see the webcam traffic back.

View 1 Replies View Related

Red Hat / Fedora :: Fill 2TB /dev/sdxx With Random Data?

Jul 5, 2011

If this post is correct [URL] I can expect that it will take more then 16 days to fill my 2TB partition from /dev/urandom. That's not workable for me. dd if=/dev/urandom of=/dev/sdxx has been running for 36 hours, and I need to finish setting up the filesystem. But I also need to make a "professional effort" at encrypting the partition. I am supposed to fill the partition with random data, to strengthen the encryption for a LUKS partition. It seems that if the bad guys get the drive, they have much more time to try and crack it, then I have to encrypt it. Ok, so I can try Code: sudo /sbin/badblocks -c 10240 -s -w -t random -v /dev/sdxx How long can I expect badblocks to run on a 2TB partition?.

View 3 Replies View Related

Programming :: MySQL - Get A Random Selection Of An Ordered Data Set

Jan 11, 2011

Given the following data structure: Quote:

[Code]...

What is the minimum possible MySQL query to get a random data selection that includes each Index number only once and ordered ascending. The maximum index number is known. For example running the query should get the following data: 01, 06, 07, 02. Running the query again, you may get the same data or another possible combination like: 01, 05, 07, 04. Of course you could run a loop for 1 to max_index and process a random ordered data selection until the next index number is found. But I think this will result in too many database access. Also you could run max_index queries to get all IDs that correspond to the given index and randomly select one ID for each index.

View 3 Replies View Related

Software :: Xinetd Appears Broken - Connections Send Random Or Butchered Data

May 30, 2011

I am trying to install the bucktooth gopher server on a Windows xp laptop. I have cygwin 1.7 installed, and I recently installed the xinetd and perl packages. I successfully (?) configured bucktooth, but I have had trouble with the connection cutting out partway through (partial directory listings, half-blank pictures, etc.). I used tintin++ to get the connection's data directly, and found that in addition to occasionally missing lines, some lines are duplicated.

I then ran the bucktooth server directly (to bypass xinetd), and found that the server was giving consistent, correct output. I then added a test service to xinetd (m4), but after connecting to this test service (through tintin++), xinetd would respond with one line of unexpected data (such as "gf" or a line from a recent bucktooth directory listing) and close the connection. Could this be a broken xinetd? My xinetd configuration:

[Code]...

View 1 Replies View Related

Ubuntu Security :: Random Password Generators?

Feb 2, 2011

I'm looking for a high quality, offline, random password generator with options for varying complexity (ie, allow/disallow user-specified characters or character classes). On Windows, I use the open-source program PWGen. The author really seems to know his cryptography, and the options available are really handy. The user manual (pdf) includes technical details

View 7 Replies View Related

Security :: Random Websites Open On Their Own While Browsing / Fix It?

Feb 23, 2011

Linux Mint 9 Fluxbox
Firefox 3.6.8

Even when I don't disturb anything while browsing, random sites start
launching (one at a time)!!

>Example:
bash.com
gifts.com
<LQ member username>.com
sex.com

I usually browse Lq, and all this happens while browsing Lq threads,
and sometimes other websites too!

View 14 Replies View Related

Ubuntu Security :: Random Outside IP Trying To Access Remote Desktop

Jun 5, 2011

I was sitting watching a TV show on the internet (streaming from channel 4) and all of a sudden I get a request from an unknown IP address, outside of my local network attempting to access my ubuntu desktop, I obviously declined straight away and stupidly didn't take note of the IP I've checked my firewall settings and no ports are being forwarded, everything is as it should be. I am running Ubuntu 11.04, and a little bit concerned. As of now I have completely disabled remote desktop on my laptop.

View 1 Replies View Related

Ubuntu Security :: Making A Hardware Random Number Generator

Apr 1, 2011

I'd like to somehow connect a serial port to a headphone jack, plug it into the geiger counter and literally dump random noise from the geiger counter into the entropy pool used by /dev/random

View 7 Replies View Related

Ubuntu Security :: Www-data Security Permissions?

Mar 17, 2010

I'm running Apache2 under uBuntu 9.10. My problem is that I use my own user "wavesailor" to work on my websites. I kept all my sites under /var/www and I set up the security of the directory after following the guidelines.

Code:
sudo chown -R root:root /var/www
sudo chown -R www-data:www-data /var/www/*

[code]...

View 4 Replies View Related

Fedora :: Fill /dev/sdxx With Random Data - Make A "professional Effort" At Encrypting The Partition

Jul 5, 2011

If this is correct [URL] I can expect that it will take more then 16 days to fill my 2TB partition from /dev/urandom. That's not workable for me. dd if=/dev/urandom of=/dev/sdxx has been running for 36 hours, and I need to finish setting up the filesystem. But I also need to make a "professional effort" at encrypting the partition. Ok, so I can try

Code: sudo /sbin/badblocks -c 10240 -s -w -t random -v /dev/sdxx So, what is "10240" doing there? Yes, I rtfm, "is the number of blocks which are tested at a time", but is that for the partition size? If so, then I would want to increase it to 204800 for a 2TB partition, right? If not, what should I do?

View 4 Replies View Related

Ubuntu Security :: Fill In Random Or Zeros In Deleted Files Without The Hard Drive Filling Up?

Oct 17, 2010

I was using dd if=/dev/zero of=/dev/user name/wipe.conf however i got a message that my hard drive is full.

lots of this is scary - dangerous. what is the best way to fill in random or zeros in deleted files without the hard drive filling up ?

View 9 Replies View Related

Ubuntu Multimedia :: Copy Random Jpg From Random Folder

Jan 19, 2010

I'm looking for a script that copies a random .jpg from a random folder in my ~/Pictures folder to my ~/temp folder with a standard filename. This file will then be displayed in Conky. I can fix the last part, but I cannot find a way to do the first part.

View 3 Replies View Related

Security :: Data Recovery Crashed ATA HDD

Jul 14, 2010

A friend has a embedded system (korg recorder) with a ata drive in it, that crashed. We are trying to come up with ways to retrieve the data off of the drive. I'm asking in security as this seems like it would be close to forensics, hence security. Hints on software for linux to help either recover files, move files, copy/clone the drive? I'm not so concerned about the korg's os on the drive, as we can create a new blank drive and install that, its the data that is critical, that needs to be recovered. The original korg os was only recognizing drives up to 100gbs so I'm guessing this might be a fat16 filesystem if that helps. Well, that and the program installed to the drive to run it in the korg is an exe.

View 2 Replies View Related

Security :: Unable To Decrypt Data?

May 6, 2010

I need to be able to decrypt data, like simple text files, that have been encrypted and base64 encoded with my public key.I need to use openssl so i do:

Code:
$cat encrypted | openssl enc -base64 -d > ./answer.txt

and i get exactly the same data as before the command was run. Am i right in thinking that i need to decode before decrypting? I tried decrypting, before i realized that i had to decode first,using this command:

[Code]...

View 5 Replies View Related

Ubuntu Security :: What Data Does Website Log When Pc Visits It

Feb 27, 2011

For example would a website log the mac address of my ethernet adapter and my computer name?

View 4 Replies View Related

Security :: What Tools And Techniques Do You Use To Analyze Data?

Apr 15, 2011

For those with IT jobs, how do you handle security monitoring for your company?

1.How do you determine what to monitor-- The most vulnerable assets, most critical or something else?

2.What kind of data do you collect for security monitoring purposes?

3.What tools and techniques do you use to analyze the data?

View 6 Replies View Related

Security :: Is LUKS The Best Data/system Encryption

Mar 20, 2011

Is LUKS the best data/system encryption? Or is there one that is even better and stronger?

View 1 Replies View Related

Security :: USB Theft Monitoring In The Data Center?

Nov 7, 2010

have around 20-30 HP and Dell Hardware where we have attached Pen Drive. There is no Rack-lock facility. A misuse of Pen Drive is reported and it happens every alternative day that someone unplug and theft the drive attached.There is no camera facility to monitor.I have a plan to write a script which will login to every machine through ILO and watch the USB availability. In case anyone dettach the USB, a mail will be sent to the administrator and thereby the steps could be taken.Does this idea look feasible.

View 13 Replies View Related

Fedora Security :: Turn Off Ordered Data Mode?

Dec 8, 2009

I am currently trying to turn off ordered data mode for ext3 filesystem. I want to shred some files and apparently this won't work with journaling on.

I can't seem to find any good explanations of what exactly "ordered data" means in terms of data recovery/security...or at least none that are written in simple n00b terms. It is all written in terms of disk crashes and whether old data will mix in with the new. It doesn't say whether one's cousin will be able to poke around and find some thought-it-was-deleted porno if he's on the computer.

Can someone step me through the process of turning this off using tune2fs? (if that is the best way to do it!) Do I have to revert to ext2? Can I turn it back on later? Will I lose data (for example, does the drive need to be reformated?) once this change is made? And how does one find, read, and delete/shred the journal itself? Is "ordered data" even a real problem for data recovery?

View 7 Replies View Related

Ubuntu Security :: Use To Encrypt All Data On USB Flash Drive?

Apr 18, 2010

Folks:What can I use to encrypt all data on my USB flash drive? If possible, could I use something that has a public Key, so I do not have to type in a password to access the information when I plug the drive into my machie, but will not open or display contant if the drive is plugged into anyone else's machine, unless they have the public key?

View 7 Replies View Related

Ubuntu Security :: Alerts When Apache LOGS Contain Certain Data

Jul 10, 2010

Does anyone know of any software that can monitor the Apache logs for certain phrases or keywords then send an alert when found? For example I know an attempt to hack has been made when I see log entries like this....

/admin/
/admin/phpadmin/
/phpadmin/

But by the time I see it, the attempt has long since failed or succeeded. What I need is a way for my server to alert me WHILE someone is entering these phrases. I realize there may be a "hit" to performance but my server is not that busy anyway (except for hackers).

View 3 Replies View Related

Ubuntu Security :: Check Data Flow For Viruses?

Aug 2, 2010

i was thinking that is there a way to check data flow for viruses? i mean if i set up calm av in my internet sharing server could it detect anything in incoming and outgoing data ?!!

View 2 Replies View Related

Security :: NTFS Data Recovery From Ubuntu Live CD?

Dec 6, 2010

I have a windows install that is totally hosed, bluescreens, etc. I want to try to force mount it from Ubuntu to get whatever data I can, but it won't allow me to mount. It keeps telling me to run chkdsk /f and reboot twice. But that's not possible. I was wondering if there are any ntfs tools for Ubuntu or any data recovery tools I can use to get what I can from this drive.

View 3 Replies View Related

Ubuntu Security :: Retrieve The Data From Hard Drive?

Mar 24, 2011

I have a friend that has a computer running UBUNTU he has not used in a while and has forgotten the user name and password for it. Is there away to retrieve the data from this hard drive?

View 2 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved