Ubuntu Security :: How To Protect From Untrusted Files

Oct 8, 2010

I want to start using videos/music files downloaded from untrusted sources (BT,Sharing Forums, etc.). Haven't made this a habit b4 because of the security risks. I want to take steps to reduce the risk & protect my computer from anything malicious. What are some good choices for this? The biggest step I took so far is using Ubuntu since it's very virus resistant, but other threats do exist out there (rootkits, malicious scripts, etc.). When downloading files from untrusted sources, who knows what may be hidden inside.Some options I'm thinking about:

1) Using a VM (with Ubuntu installed inside) & playing the files inside the VM. If anything malicious happen, it would be trapped inside & I could easily revert to a clean snapshot.

2) Using AppArmor to restrict what the files or program used to play the files can/can't do. AA seems very complicated though.

Are the above overkill? Would it be sufficient enough to just open these files on a non-admin user account since no access to root or sudo?

View 4 Replies


ADVERTISEMENT

Ubuntu Security :: Best Solution To Protect Server From Security Threats?

Jul 22, 2011

I've recently been running a game server from my desktop, as well as a web page to accompany it.I use the ports 80/8123(HTTP)/5900(VNC)/50500(GAME)/5839(ADMINISTRATION).What's the best solution to protect my server from security threats? On a side note, I plan on adding a MySQL server later, but I want to keep it local only.

View 9 Replies View Related

Security :: Invalid (Untrusted) Certificate - TWC Webmail

Oct 7, 2010

At the login webpage of <[URL]>, the Time Warner Cable (TWC) Webmail site, I am immediately confronted with a warning that the Security Certificate is invalid & that the site is untrusted. This occurs with Firefox, Seamonkey, & Konqueror. This does not occur on Microsoft or Apple systems; I have checked other colleagues machines. I have manually overridden the warning & everything functions fine. I have contacted TWC & am awaiting their tests. But, I would like some independent corroboration from other users in the Linux community. Could some of you perform the test yourself on this URL? An error will be readily apparent.

View 14 Replies View Related

Ubuntu Security :: Is It Safe To Use Apt-get Trough Untrusted Proxies/mirrors?

Jul 10, 2010

What if someone tampered with some important security updates, and suddenly you get a rootkit instead?

View 4 Replies View Related

Ubuntu Security :: Generic AppArmor Profile For Untrusted Application

Sep 3, 2010

I've read and re-read everything I can find about AppArmor, to no avail. On the whole, AppArmor isn't for me. However, rather than give up on it completely, I have an idea: create a profile that I could use as a template for any untrusted application, with the aim of 1) blocking it from network access and 2) blocking it from installing other applications. I've got as far as creating an empty profile:

Code:
# Generic AppArmor Profile for UntrustedApplication
#include <tunables/global>
/usr/sbin/UntrustedApplication {
#include <abstractions/base> }
What do I need to add to make this profile 100% permissive, except for the two exceptions stated above?

View 9 Replies View Related

Security :: Check Mail Via Tor And Browser Says Connection Untrusted?

May 20, 2011

I was recently connecting securely to the website where I have my mail account, and I connected through Tor. When doing so firefox presents me with the screen saying that the connection is untrusted and it can't verify the certificate. So I cancelled. I'm using torbutton and I turned torbutton to off and connected again with no problem. Then with torbutton on again, same thing (untrusted).

Is it possible the exit node I was going through is doing a man in the middle attack? However later when connecting through tor I did NOT get the warning about the site being untrusted. I really don't know what exit node I was using when I got the certificate warning and what exit node I was using when I did not recieve the warning. I don't know how long I stay on the same node or how/when it changes.

View 4 Replies View Related

Fedora Security :: Securing A Server For Deployment In Untrusted Zone?

Apr 1, 2010

I have to deploy a server to some customers that should not be given access to the server itself. I know that nothing is 100% secure but I've searched without finding a decent answer (maybe I googled for the wrong terms ?)I need some advice about encrypted filesystem. * The server must boot without asking for a passphrase (the server will be in a restricted access area so typing a password could take a while). I can't store the password for luks in an unencrypted file so it seems a loop to me. The only way out I can see is to store the passphrase in the boot binaries (better than nothing...) but this results in more work for me.* possibly the customer should not be able to move the hard disks to another pc, i.e. reading the passphrase from some unique hardware ID. This is risky but I could add a master passphrase to be used in case of hardware replacement

View 3 Replies View Related

Ubuntu Security :: Does Firestarter Protect Out Of Box?

Sep 15, 2010

I was wondering if firestarter (software firewall) works out of the box or does it need some kind of configuration in order for it to provide protection? Is firestarter even needed with ubuntu?

View 6 Replies View Related

Security :: HOW TO Protect From VPN Attacks

Jun 1, 2011

I would like to know how to protect networks against VPN attacks? How does big industries do it? What does the government tend to use? Are any tools open source that I may get?

View 1 Replies View Related

Security :: Protect Server From Url Injection?

May 20, 2010

I am facing problem on my Linux server, those runing php sites, most of the time hacker upload file in my website and take the control, and hack the sites, shoot the thousands of mail etc

View 7 Replies View Related

Ubuntu Security :: Password Protect Evolution (or Other Executable)?

Jan 4, 2010

I want to password protect evolution. How would I do that? I want to allow anyone to access all my other software, but my business email needs to be privateMy current solution seems to be to setup another account. But all the user switching and other what not seems a little much for one program.

View 2 Replies View Related

Ubuntu Security :: How To Protect The Whole GRUB2 Boot Menu

Mar 7, 2011

I've already read and tested the various guides for pasword portecting the menu items. What I need is a little bit different. I need to protect the whole boot menu so normal users cannot select any entry at all and only let the default entry boot.

View 4 Replies View Related

Fedora Security :: Trying To Password Protect Directory

Apr 1, 2010

I create music and usually gets sold world wide. I have some distributors that have been able to access a private server and get the new tunes I make to download via ftp. Well that server is getting full and I was trying to create another directory on my website itself.I created the directory. made the ".htaccess" file. Then I tried to make the htpasswd file but my server just keeps saying no command by that name.

View 8 Replies View Related

Security :: Centos 5.5 Server - How To Protect From Outside Attack

Dec 21, 2010

I have just configured Centos 5.5 LocalMailServer with fetchmail and sendmail , Proxy with Squid and FileServer with samba. Now my concern is security.. How can i protect my server with outside attack. Will I need to block some ports or I need special tools or script so no one from outside can attack my machine. My machine is working on intranet with local ip only.. No web server or static ip exists. Machine is connected with ADSL router to access internet.

View 5 Replies View Related

Security :: Some Precaution Should Take To Protect Notebook From Intruders?

Jun 3, 2010

I am planning a trip for a few days and I will be staying at an inn with Wifi access. All the guests are allowed to use it. A friend of mine has been there, he told me there are several other private spots around the house, i.e. lots of other people using Wifi. My friend told me the inn uses WEP, so who knows how many times their access point has been hacked and accessed without permission...

My concern is that I will be there for a few days with my notebook, I will have to work once in a while, connected to the Internet. Is there some precaution I should take to protect my notebook from intruders? Is it advisable to install a firewall in my notebook (iptables?) or am I just overreacting? Is it possible for one of the guests or neighbors to break into my notebook?

View 8 Replies View Related

Fedora Security :: Programs To Protect My Computer On Internet?

Apr 29, 2009

are there any programs that will protect my computer on the Internet. Just started using fed 10 from windows so i am not sure what i need to do. I am using an acer aspire 5630 laptop.

View 1 Replies View Related

Fedora Security :: Password Protect File Folders?

Oct 12, 2009

I was wondering how to password protect certain file folders?

View 6 Replies View Related

Fedora Security :: Configure See To Protect The Contents Of A Folder?

Jul 28, 2011

im currently trying to configure SE Linux policy for a folder so that only my user with root privileges can access it and not just root but i don't know the commend to run on the folder to change its permissions

View 4 Replies View Related

Security :: How To Password Protect Folder So Can Open It On Windose

Oct 5, 2010

I would usually just root the permissions to 000 but I need to password protect a folder on a usb drive and then open it on windows.

View 1 Replies View Related

Security :: Protect Samba Server For Limiting Access To Certain Domains?

Nov 24, 2010

I was looking for a way to protect my samba server for limiting access to certain domains.Can I use the parameterhosts allow = example.comor something like that or is there another way to do the job for domains

View 4 Replies View Related

Ubuntu Security :: AppArmor Protect Devices And Limit Their Access To The File System?

Nov 9, 2010

This might sound really stupid, so you'll all have to excuse my lacking knowledge. I read that USB attacks get more and more common, like putting in an USB stick with a malicious autorun script on it, and it's game over. Can AppArmor protect devices and limit their access to the file system?

View 5 Replies View Related

Fedora Installation :: How To Protect Previous Personal Files/data

Jan 26, 2010

When I install Fedora 12, I tried to use manual partition like before. But installation failed somewhere. So I have to accept Fedora 12's default partition. Once I experienced slow login problem. I have to reinstall. But the reinstallation would delete the previous installation. Is there a good way to keep personal files intact on reinstallation?

View 1 Replies View Related

Ubuntu :: Cannot Execute "untrusted" Files/programs On Xubuntu

May 26, 2010

I cannot execute "untrusted" files/programs on xubuntu but I could on ubuntu? I'm admin but cannot edit permissions. I tried opening it with wine but still get the execute error and looked everywhere for a solution and can't find one.

View 4 Replies View Related

Fedora Security :: Anti-Virus Used To Protect Fedora From Spyware And Virus?

Aug 22, 2009

if there is any free software there used to protect Fedora from spyware and virus?

View 8 Replies View Related

Ubuntu :: Can't Install Anything - Says The App Is Untrusted

Mar 25, 2011

I have managed to fix the problem where Ubuntu did not recognize my admin password,but now I have another problem.I tried to install an application from the Ubuntu Software Center.I entered my admin password, when I was asked to do it.Then,I got this message: ''Requires installation of untrusted packages The action would require the installation of packages from not authenticated sources.''

And I am not allowed to install the program.It happens regardless of the app I'm going to install-thus I can't install anything! I use Ubuntu 10.10.

View 8 Replies View Related

Ubuntu :: Untrusted Packages In The USC?

Mar 29, 2011

I have just recently installed ubuntu on a new (new to me at least) machine and am have some trouble installing common programs from the USC. Like Amarok, BlueFish.. ect. Pretty much everything I have tried says it requires download from untrustworthy source. All installed fine on my laptop. I am running natty narwahl on this computer and 10.10 on my laptop.

View 1 Replies View Related

Ubuntu :: Installation Of The Untrusted Packages?

Jun 26, 2010

I have a lenova B450, installed ubuntu 10.04 netbook remix(dual boot with win xp), everything works fine, even installed some games through ubuntu software center. I tried to install cd burning software, i received the following message. Requires installation of untrusted packages The action would require the installation of packages from not authenticated sources. Even after i gave OK there was no response. Now when i tried to install games also same message & no response.

View 3 Replies View Related

Ubuntu :: Everything From Software Center Is Seen As Untrusted?

Feb 14, 2011

i could really do with some help, basically every package is seen as untrusted and it is stopping me from upgrading or updating, and to install packages i have to do it from apt-get and say that i trust the source.

View 9 Replies View Related

Ubuntu :: Firefox - Connection Is Untrusted

Apr 20, 2011

I got this error (see the pic from this link [URL]) when opening google account, face book, etc. Some guys suggested to check the system time and make sure the computer time is same as the local time. According to this hint, I run the command "sudo tzselect" and choose "Europe -> Dublin" (Im in Dublin), then restart PC. However, the error still pops up.

View 4 Replies View Related

Ubuntu :: Requires Installation Of Untrusted Packages?

Jun 17, 2010

whatever i try to install through the Ubuntu Software Center or through synaptic i get an error "Requires installation of untrusted packages" and it says "The action would require the installation of packages from not authenticated sources." what am i doing wrong or what settings am i supposed to change?

View 7 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved