Ubuntu Installation :: Converting Insecure Live USB Into A Secure User
Sep 18, 2010
I'm trying to alter the usb install so that I have a user with a password. Being careful I created a new user, added them to the admin group and tried to login.
View 1 Replies
ADVERTISEMENT
Jan 16, 2010
I recently ubgraded to ubuntu 9.10 from 9.04, but I had the same problem there. I can see the secure connections, but when I try to connect to them, it tries to connect, works at it for about a minute, and then asks for the password again. This just started a week ago or so. I am new with ubuntu, so while I know that there are terminal outputs I should probably post, I don't know which ones.
View 5 Replies
View Related
Mar 11, 2010
Is an ubuntu live cd totally secure from intrusion? Stated another way, even if someone knows my ip address, can the live cd environment be hacked into in any way so that another could monitor what I am doing on my computer? From my understanding the live cd is read only, so that would prevent anything malicious being installed on it. I am curious if there are other ways a box running a live cd could be tapped into.
View 6 Replies
View Related
Oct 3, 2010
Have not found this elsewhere so here goes.
I had a friend ask how he could do his electronic banking without a chance of any information being left on his computer once he is done.
I thought of a Ubuntu live CD but have seen the HD activity light flashing when using one. That leads me to believe that some kind of use is made of the HD and that makes a live CD questionable. He wants no information on the HD even in unassigned sectors.
Maybe, better yet would be a USB thumb drive that runs Ubuntu or another distribution that will not use the HD or even require that one be in the computer. A plus with a thumb drive would be that it would only be available on the computer when it is being used so it could contain passwords etc. Of course, it would have to be removed when not in use.
View 5 Replies
View Related
Nov 9, 2010
I can't seem to find this anywhere. I have burned Debian 5.06 for i386 and trying to login when running the live cd. What is the username and password to get in?
edit....
I found 'user' and 'live' but they don't work.
View 10 Replies
View Related
Apr 13, 2010
perform below activities please guide how to do perform below activities.Make sure the Guest account is disabled or deleted.-Disabled or deleted anonymous accessSet stronger UserID policiesSet Key Sensitive UserID Default enable in linuxCombination of numbers, letters and special characters (*,!,#,$,etc.)
Status of UserID
Type
User Name
[code]....
View 3 Replies
View Related
Mar 12, 2011
On a new ASUS eee PC 1015P, the Windows 7 o/s supplied works fine. Experimenting with a Fedora 14 Linux o/s, currently just booting to a Live User system on a USB Stick, there is no wireless networking. In case it is relevant, the wireless LAN Card details (as reported from lspci) are: Ralink RT3090 802.11n 1T/1R Wireless LAN Card Driver Version 3.1.6.1 Should I be expecting wireless to be working on the USB version, do I need to do a full install to get wireless or is it maybe a drivers problem?
View 3 Replies
View Related
Feb 21, 2011
I want to change my user name, pretty my replace my user name completely so that it is reflected all around the OS. What is the less dangerous and most secure way to do it? I guess I can create a new user copy stuff all over but if there is an easier way I am going to prefer it.
View 7 Replies
View Related
Apr 22, 2010
we are trying to make a policy decision whether to go with SSH user/passwd or PPK secure key ? our servers are hosted remotely by a hosting service. we were wondering which of these two models are more secure.e.g. i would tend to think that user/passwd with account lockouts upon failed attempts would be more secure because the other option exposes your server in case someone sneaks the PPK file or steals your whole computer.however, what makes me doubt myself is that Amazon Web Services EC2 cloud hosting uses PPK by default (although an instance's SSH config can be change to accommodate logging in but they don't endorse it).
View 3 Replies
View Related
May 7, 2010
I want to restrict a user accessing my ftp site.
1) i can block the user in ftp configuration file
2) i can block the user in PAM or /etc/host.deny
i heard that if pam is denying the user and ftp is allowing the user the user can get the access it means that ftp conf file is stronger than host.deny
View 6 Replies
View Related
Apr 23, 2010
I am using Red Hat and was wondering how to disable username and password only login and require that a PPK secure key file be used for authentication ? I can log in using the secure private key and the public key that is in ~/.ssh/authorized_keys but i can still log in using the plain username and password login.
View 2 Replies
View Related
Mar 14, 2010
I've setup Kerberos and OpenLDAP servers (9.10) similar to the official documentation (and other sites that fill in the "gaps"). However, when you start to get in to some of the details, there seem to be many options - and I guess I'm looking for what could be the defacto standard. I'd like to allow Ubuntu clients to have a sso capability, with the ability for local caching of passwords if not connected to the network (such as a laptop user away from the office, prior to a VPN). I'd like to automount a secure NFS share somewhere in the /home directory. If the user logs in to a computer they've not logged in to before (if they're authorized), it would be nice if a skeleton /home directory could be setup there automatically I'm guessing that it is not desirable to use a shared /home NFS - as if you're off the network this would be problematic - as well as multiple computers sharing the same /home. There are some benefits to a shared /home (SSH certs, etc.), so maybe there is a hybrid approach out there.
I've read that it's not necessarily good practice to have OpenLDAP to do the authentication (leave this to Kerberos), but it's fine for authorization (such as ACLs for logins to certain computers). It's also good practice to use TLS with OpenLDAP (which requires public certs on all the clients) and to not allow anonymous read to the directory. I would guess that a computer host keytab could be refreshed to bind to the OpenLDAP server via GSSAPI / SASL to allow a non-anonymous read, and then determine if, say, the user was a member of a group allowed to log in. Kerberos would then pick up and authenticate the user and then proceed to the login. Off the network here, I'm not sure. I found this document, but it's self declared missing items: [URL]
I'll stop the rambling, but I cannot be the only one who would like to setup a relatively standard and secure server based network authentication and authorization back-end. Is there any _complete_ documentation on the best practices and how to implement?
View 4 Replies
View Related
Sep 12, 2010
I've configured iptables to act as a stateful firewall, but instead of simply rejecting packets I'd like to waste a potenial hackers time by droping any packet that would otherwise be returned. Are my rules sufficient or have I somehow opened myself up to an attacker by trying to write these rules myself?
View 3 Replies
View Related
Jan 4, 2011
Ubuntu 10.04: no problems to connect to secured wifi networks. However, when trying to establish a connection to an insecure wifi after some time I get the message "disconnected, you are now offline" without ever having been connected. Once out of about 30 times I get a normal connection. My eeePC 1005HA is double boot and I can connect from WinXP without problems. There seems to be a DHCP timeout (see attached output of syslog). I have seen some posts about the same problem but none of them had a solution. I hate it to use WinXP just for the sake of connecting to the spot.
View 9 Replies
View Related
Jan 29, 2011
I have a Bluetooth connected to my desktop computer, it's on all the time, I use it to transfer files between PC and cell phone. I was searching Google about hacking Bluetooth and all I found was about hacking mobile devices. I don't care about my cell phone - it has nothing important, but I'm curious about my PC security. Can someone get access to my HDD via Bluetooth like it's possible via Wi-Fi?
View 5 Replies
View Related
Dec 1, 2010
I'm an Oracle DBA and started working for my current employer about 4 months ago. This past weekend an alert re: FS space brought my attention to /var/spool/clientmqueue (full of mail re: cron jobs) and the fact that sendmail is not running on our Linux servers.I'm told that the IT security team deemed sendmail too vulnerable so we don't run it.Aside from FS filling up and missing notification of issues with crontab entries, I'm concerned that we may be missing notification of potential issues. In other Unix/Linux environments I've seen emails from the print daemon when it experienced problems with specific jobs.
Are there other Linux facilities aside from cron and lpd that use email to advise the users of possible issues? Are there ways to secure sendmail or secure alternatives to sendmail? My primary need/desire is to make sure that emails regarding issues on the server get to the appropriate users. Secondary goal would be to have the ability to use mailx to send mail out. There is No need/desire to receive mail from outside.
View 1 Replies
View Related
Mar 14, 2011
I have an security cam with a built-in webpage inside my home network. That camera is using basic HTTP authentication instead of SSL. I want to be able to access the camera's webpage from outside my network, but I don't want to open an unencrypted video stream to the outside world. Right now, I'm doing some cumbersome ssh tunneling where I bounce off an ssh server like: ssh -N -L 9090:[URl]..and then I connect to my web page like: http://localhost:9090
But this is a pain. Now, gentle reader, I beseech you to tell me how I can use linux (Ubuntu) to get a fully encrypted SSL connection to my internal web page without the hassle of creating an ssh tunnel each time. I believe I can use stunnel, but I'm not sure of the command.
View 1 Replies
View Related
Oct 15, 2010
One user in my company wants to run some flush cache queries on a MySql database, it needs "reload" privileges of Administration, how secure is to give this rights to a normal user ?
View 2 Replies
View Related
Jul 23, 2010
I have a server I'd like to convert from CentOS to Ubuntu 10.04. The only issue is that I don't have physical access to the machine or access to any part of the boot process. Using only ssh, how would I install 10.04 on this machine?
View 1 Replies
View Related
Sep 8, 2010
I've done a good few ubuntu installations for friends and colleagues and now my Dad wants in on the action. His PC is more than capable of running ubuntu 32 bit BUT I've hit a brick wall I've never come across before. I've burnt a CD image of the 10.04 iso from [URL] on my ubuntu box and for some reason, his PC just won't boot from it. If I select the option to manually select the boot source, all I see is the hardware monitor telling me things like CPU temperature. As for the Live USB - nothing whatsoever. Is it possible that I've managed to corrupt the iso file somehow?
View 3 Replies
View Related
Apr 28, 2011
Live CD: I dowloaded the ISO, burned it to CD, booted from this CD. It starts to load and I can see the purple background with the loading icons. Everything seems normal. But instead of ending up with the login screen, it ends up with a screen that says 'Please remove all bootup media and hit ENTER' or something like this. So I hit enter and then it shuts off my computer. That's it.
Live Stick: So I tried another option and created a stick with 'usb-creator.exe' that is on the CD. Then I start from that stick, but all I end up is a line of 'Syslinux bla bla copyright 20xx-2011'. That's it. Then it does nothing anymore. The cursor is blinking, but no prompt or whatsoever and keyboard input doesn't do anything.
Now something weird: When I insert Live CD and Live Stick at the same time and then boot my computer, then it boots into Ubuntu. Obviously it loads the first parts from CD and then the rest from stick. Because when I'm then in Ubuntu and try to format the stick, it says it can't do so, because there's system files from that stick in use.
View 5 Replies
View Related
Feb 18, 2010
I recently upgraded my hardware and installed 32-bit Karmic (well really Mint 8 ) before realizing I would probably have gotten better performance from the amd64 architecture. Is it possible to convert an i386 system to amd64? Is it a good idea? Will there be a lot of problems afterwards? Is it easier to just backup home and etc, install a clean 64-bit system, then restore settings from backup? If I do convert the system, how do I do it? I thought I might be able to just install a different kernel but I can't find an amd64 kernel in the repositories..
View 8 Replies
View Related
Apr 15, 2010
Before I start, I have searched everywhere I can for help with this, tried everything suggested and still cant do this.
The annoying thing is ive done it before but cant replicate it.
I have ubuntu installed on my usb stick using lili usb creator.
I want to remove live session user (username ubuntu).
Ive created my own account with privileges etc.
Ubuntu is 9.10.
View 6 Replies
View Related
Sep 23, 2010
I need to access some things in "documents and settings" folders (my windows xp crashed). I believe I need to be root user in linux to do this. I am running a ubuntu linux live (uninstalled) cd. I am new to linux and I do not know if this is even possible. I want to copy some things from documents and settings folder to an external drive (as backup) but I cannot access them as things are now (linux gives me an error when I try) but I would like to do it in gui so I can physically "see" everything and look through it.
View 9 Replies
View Related
Jul 4, 2011
When I boot from a live USB, it automatically logs in as the live user. I don't want that. I want to log in as a real user, without having to log out of the live user session first.I looked at all the options under system > administration > users&groups. Nothing seems applicable.PS, I did already create the real user and it's working fine. I just have to log out before I can log in as the right user.
View 5 Replies
View Related
Nov 23, 2010
From a friend I received a cdrom with Ubuntu 8.10 and recently I tried to install it on my laptop. The installation failed and moreover the volumetypes of the partitions, including the system partition, on my disc have been changed from "basic" to "dynamic" which is very annoying because now I cannot restore my backup. I have now spend a couple of days trying to restore my disc back to its original state but to no avail. Can anyone tell me how to change the volumetype of the systempartition (which cannot be deleted !!!) from "dynamic" back to "basic". My PC is a Dell Vostro 1720 with Windows 7.
View 2 Replies
View Related
Feb 26, 2011
i am trying to recover some files on a partition through the ubuntu live cd (they are hidden files and i can't find anything else that would work) and it said i needed root privaleges in order to copy them. is this possible and how do i do it
View 8 Replies
View Related
Sep 1, 2011
I want to convert my swap space 8GB to usable formatHere is the output of sudo fdisk -l command$sudo fdisk -lDisk /dev/sda: 80.0 GB, 80026361856 bytes255 heads, 63 sectors/track, 9729 cylindersUnits = cylinders of 16065 * 512 = 8225280 bytesDisk identifier: 0x26af26ae
Device Boot Start End Blocks Id System
/dev/sda1 * 1 2295 18434556 7 HPFS/NTFS
/dev/sda2 2296 9728 59705572+ f W95 Ext'd (LBA)
[code]...
View 3 Replies
View Related
Aug 23, 2010
what is the default user ID and password in remastersys for live cd / usb session?
View 3 Replies
View Related
Feb 14, 2011
I want to add files to the live cd. I use distcdfs because backup errors out because i have too much data on dive. I have the modify set to exclude everything but what I want. when i add my files in the /home/user/myfiles they do not transfer to the live cd? I'm using the gui so what I'm I doing wrong?
View 1 Replies
View Related