Ubuntu Security :: Business Espionage Dressed Up As ISP "Privacy" Policies?
Dec 2, 2010
A US ISP's "privacy" policy basically states that they will collect any and all of your data (email, posts, surfing etc ) and then "share" it". direct me to a "checklist" which can suggest counter measures for non-geeks? How can we function if we cant trust our ISP? Are there some specific 'tricks' in Ubutu to foil rogue ISPs? If yes, it would be a great 'selling point', especially for professionals concerned that rogue ISPs could "share" their intellectual property.
View 9 Replies
ADVERTISEMENT
Feb 3, 2010
Is there a way to delete files on the commandline that uses the KDE-Wastebin?It appears that I never ever need the KDE4 Wastebin for files that I deleted through Konqueror or Dolphin. It is only when I delete files on the konsole with rm that I wish I could undelete them. It always happens like that, mostly by being in the wrong directory or using a wildcard when I should not have. (I don't have any erroneous deleted file right now, and I do have plenty of backups, but I just wonder whether there is something better than rm to use generally on the commandline.)
View 9 Replies
View Related
Sep 27, 2010
I am currently reviewing what it means to switch over to Ubuntu and I have the following scenario. If I was to switch all the windows servers over to an Ubuntu solution. I already understand that file servers/ mail servers and resources can be provided Ubuntu 10.04. The issue comes with the user accounts access and control. In a windows environment, I have a domain with sub domain sites. I am able to control passwords in each site separately thought Active directory. I need the instructions on how to setup an LDAP server so that I can control access rights to different services located on different servers.
Example 1.
I have 5 mail servers and on the HR side, I have 2 email administrators. I wish to provide them access to only the relevant resources centrally. With out having to add users to different users repeatedly. For example, if I wanted to grant the two administrators access to all five servers. As I understand it, I would have to create the same user on every server and add a public key on every server, as well as set the administration rights for that user on each server individually.
I want to be capable of doing this like I am in a windows environment from some sort of domain controller equivalent. Things that I must be able to do, manage users public keys on each server centrally. Add and remove user's access to each server centrally. Finite control on what each user can do on each server. (i.e., add them to the sudo group or any other group for specific servers/server class I specify). To a lesser extent of requirement, I also need to be able to inform users they have to change there password every 3 months from when they change it. As well as enforce password rules, such as characters complication.
View 3 Replies
View Related
Apr 12, 2009
I am facing a problem when I tried to set policies on the firewall with following commands:
iptables -A INPUT -p TCP -s 0/0 --dport 53 -j ACCEPT
iptables -A INPUT -p UDP -s 0/0 --dport 53 -j ACCEPT
iptables -A INPUT -p TCP -s 0/0 -j REJECT
[code]....
Here, I want to deny all traffic except DNS traffic, it should be permitted. I tried to log the traffic but I did not find any update in /var/log/messages.
View 4 Replies
View Related
May 23, 2010
I have two Ubuntu PCs at home and I found out about apt-cacher as a means of reducing internet usage for updates. (my connection speeds aren't that good). When I install apt-cacher, is it possible for anyone on the internet to use my PC as a repository? If so, how can I allow only computers on my LAN to access the apt-cacher cache?
View 9 Replies
View Related
Apr 14, 2011
Write a shell script setup linux security policies include:
1. password policy
2. User policy
3. firewall
Note: Create a file.sh from 1 to 3. purposes:
If (1) successful then 2 If (2) successful then 3 End
View 3 Replies
View Related
Apr 13, 2011
I don't know how to write a shell script to set security policies for Linux to start. and how. I know that there are many security policies for Linux but do not know which one best suited to write a shell script.
View 5 Replies
View Related
Oct 22, 2010
Has anyone worked in building p2p apps and protocols? I'm talking an actual p2p network of physical devices that is strictly p2p, no servers for most things. Are there security and privacy benefits to p2p? How are addresses handled, like say you want to send a message to a specific friend but you don't have the relatively static IP system in the Internet. How are those things handled?
View 1 Replies
View Related
Jan 8, 2010
These files seem to contain browsing history:
~/.mozilla/firefox/xxxxx.default/cookies.sqlite ~/.mozilla/firefox/xxxxx.default/formhistory.sqlite ~/.mozilla/firefox/xxxxx.default/downloads.sqlite ~/.mozilla/firefox/xxxxx.default/places.sqlite ~/.mozilla/firefox/xxxxx.default/places.sqlite-journal
~/.mozilla/firefox/xxxxx.default/Cache/
Therefore I have cleared these files using an erasing program. I am wondering if there are other locations where such log files are stored for Internet browsing. I have looked in the /var/log directory and cannot see anything - for example doing a grep on http:// after browsing in Firefox does not reveal anything obvious.
View 6 Replies
View Related
Jun 16, 2010
I have LTS 10.04 with firefox 3.63 and the cookie settings are not there. Does anyone else have missing privacy settings. I dont like the idea of tracking cookies and want to do what I can to get rid of them.
View 1 Replies
View Related
Jul 15, 2009
I stumbled across this privacy app today, it's sort of like a CCleaner for Linux. I only see one mention of it in the forums, and I'm wondering why nobody's using it. It seems to be pretty thorough and preforms as they advertise, the site says it has overwrite capability but I'm not sure what algorithm it's using, as I haven't looked at the code. Anyway seems like something that ought to be in the repos.[URL]...
View 14 Replies
View Related
Jun 12, 2010
Intrepid Ibex (U8.10) is what I am using presently and I would like to know if there are measures that I can take to prevent my ISP from keeping data that flows between my PC and it.
I am living in Australia, I am wanting to keep the bastards (read: Australian Government) ignorant about what I use my PC for.
Its them storing any of my personal information that I am worried about, but if I can keep my history from them completely, even better...
View 9 Replies
View Related
Jul 26, 2010
I am certainly a Linux Newbie..I have a business with a network of PCs that need not get client files corrupted by viruses & other bad things from the internet...YET I would like to let my employees(who are way worse newbies than me..om Windows even...& stand good chance to mess up computers) use internet at times if they wish. My first thought was just separate side by side PCs, one to get on for Clients/business network etc, & the other to get trashed by the internet.
What I am thinking is a better alternative (& I need to know from yall who I'm sure are way beyond this newbie whether this thinking is correct) is to put something like Puppy Linux 5.0 on small memory USB flash drives & let them each have one to use for internet, simple application functions etc. Can I safely believe that running internet browsing on the flash drive with Puppy Linux booted & running as the OS is NOT going to potentially infect my windows XP business PCs with viruses etc?
View 6 Replies
View Related
Oct 26, 2010
I can't seem to find the "Authorizations" GUI that was present in earlier ubuntus for configuring system policies. It used to be in System - Administration - Authorizations. Which package does it come in? What's the console command for it?
View 2 Replies
View Related
Jan 5, 2010
I remember that one complaint about XP was the way that when you used Firefox or IE index.dat files were created which were violations of privacy.
If, after browsing, one deletes the relevant firefox files are there any other locations or logs in Ubuntu that record details or times of browsing?
Currently these files seem to contain browsing history:
I have looked in the /var/log directory and cannot see anything but perhaps other people know?
I just want to know if and where browsing activity is located (apart from in the /user/.mozilla directory).
View 3 Replies
View Related
Nov 24, 2010
How would I ensure that whenever any user changes the password it should meet following.
1)It should be more than 7 Characters.
2)Atleast one Upper case character,digit and special character present.
3)Password is not same as username or dictionary word .
4)User should get email after changing his password(I have already setup mail account and tested the setup).
Code:
Distribution Detail
# lsb_release -a
LSB Version: :core-3.1-ia32:core-3.1-noarch:graphics-3.1-ia32:graphics-3.1-noarch
Distributor ID: EnterpriseEnterpriseServer
Description: Enterprise Linux Enterprise Linux Server release 5.2 (Carthage)
Release: 5.2
Codename: Carthage
# uname -a
Linux OFSMUW-VMGR-51 2.6.18-92.el5PAE #1 SMP Fri May 23 22:26:05 EDT 2008 i686 i686 i386 GNU/Linux
View 8 Replies
View Related
Mar 21, 2010
I just put privacy remix on a usb drive. It seems to be working ok, but no internet.
I'm connecting to the router with an ethernet cable and it works ok in windows.
I can't find anything in the setup guide that says you have to do anything special to connect.
View 4 Replies
View Related
May 20, 2010
I can not find a way of removing original email addresses from a email I wish to forward so I can maintain the privacy of the original sender.
View 3 Replies
View Related
Mar 26, 2010
Is it possible to only view certain chains and more specifically certain chain policies with options when doing: iptables -L..I would like for example view FORWARD ACCEPT rules instead of waiting for all of the drop rules to load when viewing a firewalled iptables.
View 1 Replies
View Related
Jun 25, 2011
Does anyone know how to (permanently) get rid of this?
As you might have guessed, typing the root password and pressing OK has no effect.
This is NOT a laptop!
View 7 Replies
View Related
May 1, 2010
I've searched lot on forums but couldn't find a related post. My problem is I want to hide my mail folders when login attempt in Evolution has failed. I dont use Remember password option so everytime I'm prompted for password.
When I give no password and escape that dialog, I can see all the mails that have been already downloaded form my gmail account. If any of you guys know already existing post, please redirect me to that one.
View 2 Replies
View Related
Sep 24, 2010
Firefox used to work fine, then I played around (only) with privacy settings, and now it deletes all cookies (including ones set to expire in a month) at the end of the session.It is set to "remember history". Moving to a new profile is not an option.
View 3 Replies
View Related
Nov 28, 2010
Just for the fun and learning experience I am working on a minimal install with Squeeze +IceWM. The goal is to make a livecd with a set of privacy apps - like Iceweasel with Tor/privoxy and some encryption tools. Everything is working out just fine, but I thought it would be very nice to have an installer. I read about the refractainstaller and refractasnapshot in this post, and thought they sound like a good solution: viewtopic.php?f=19&t=54635#p315738 However, the links seem to be dead and so were all the mirrors I tried. Does anyone know where these files can be found or any other easy way I can make Debian installable from a livecd?
View 14 Replies
View Related
Jul 1, 2010
I need GIMP to work for my place of business. When I open gimp in terminal and run the program, everything is fine untill I click on either smudge, pencil, text tool, etc. It just crashes, and terminal says this: gimp: fatal error: Failed to register GObject with DBusConnection script-fu:2795): LibGimpBase-WARNING **: script-fu: gimp_wire_read(): error
View 2 Replies
View Related
Aug 15, 2010
I always used to wonder how do web hosting companies host their websites. My problem is I saw some one having their website.I have a degree in Computer Science. I am not clear as how do these web hosting companies give the logins to their users as root. Meaning how can a hosting provider provide root login to say 1000 users and each having a different IP address.
View 4 Replies
View Related
Dec 23, 2010
I am looking for an Ubuntu replacement program for MDBS, which is essentially a business management program that Matco uses for tool sales.I need a program that:
- includes a way to archive my customers, their sales history and personal information
- archives my products so that I may simply choose what my customers have purchased from a list and invoice them with a sales receipt
View 9 Replies
View Related
Jan 7, 2011
I want to know can I use ubuntu for my business after downloading it from the site? I am bit confused after seeing many threads on the internet.
View 1 Replies
View Related
Jun 1, 2011
No matter what modifications I make to the printer settings, in order to get both the addressee and the return address on the 4.5x9.5 envelope, I cannot get the information on the face of the envelope.
View 2 Replies
View Related
Jun 17, 2011
I have designed a business card in Inkscape and saved it as a .pdf file. When I sent it as an e-mail to my local printer, they said the file could not be opened. I then saved the file in about every format that Inkscape Save As... option gave me and sent it to them to no avail. They use Windows software as does all printers in my city.
Is it possible that WINE can covert this high graphic rendering and allow me to send it to my printer? If so, how can I do this?
View 4 Replies
View Related
Nov 24, 2010
I am new to Linux and have just moved over from Windows (kill Bill) never to look back. I do a lot of Business Plans for new business start-ups as well as existing small business'. My question is, is there anything similar to Business Plan Pro, by Palo Alto Software, written for the Linux OS?
View 1 Replies
View Related