Ubuntu Security :: SSL Without Users Having To Confirm Certification?
Jun 11, 2011
I am looking for the best method to implement SSL for my sites but without users having to accept the CERT and I'm small so I'd want to use the cheapest method like signing my own certs. Is there an automatic way of doing it or best practice?
View 8 Replies
ADVERTISEMENT
Nov 1, 2010
We are trying to set up a classroom training environment where our SIG can hold classes for prospective converts from Microsoft/Mac. The ten machines will have /home/student01..10 and /home/linsig01..10 as users. We want /home/student01 to be able to explore and sudo so they can learn to administer their personal machines at home. We don't want them to be able to modify (sudo) /home/linsig01. I've seen the tutorial on Access Control Lists but I'd like other input so we get it right the first time.
View 3 Replies
View Related
Oct 15, 2010
To avoid having to input a password for the keyring each time I connect to the net via wireless, I enabled the 'Available to all users' option in Network Manager. Now, my question is this. Are the 'users' it refers to just those created on this machine? Would a drive-by be able to use my network without entering the password?
View 3 Replies
View Related
May 12, 2010
I have an environment with multiple projects that have a variety of government and commercial sponsors. We have been satisfied to this point with a netapp serving nfs/cifs and keeping a tight reign on nfs exports.Some of these projects have started asking us to provide access restricted sub-folders of the project space based on different groups that contain a user subset of the primary group.
We have a linux machine that serves as a version control front end to the netapp, mounting the project spaces via nfs. People are now mounting their project space via sshfs to this "front end" and sharing the root password of this sshfs client with everyone in their project, in turn creating a security hole to access the so called restricted sub-folders. I know all the obligatory responses referring to irresponsible user behavior but would like to see how others have addressed something like this where user behavior seems out of control.
View 12 Replies
View Related
May 16, 2011
I'm running 10.10 on a Pentium laptop that also has Win7 64bit installed. I did some googling on this and then ran uname -a in a terminal.
advait@advait-laptop:~$ uname -a
Linux advait-laptop 2.6.35-28-generic #50-Ubuntu SMP Fri Mar 18 19:00:26 UTC 2011 i686 GNU/Linux
Based on what I saw in my google search, it means I'm using Ubuntu 32 bit. I want to make sure I download the correct version of Google Earth.
View 7 Replies
View Related
Oct 13, 2010
For anyone who is not familiar with it, I am talking about the trim functionality in the 2.6.33 kernel for solid state drives.
View 6 Replies
View Related
Mar 27, 2010
1. I ordered an Opensuse 11.2 Live CD-Gnome 32-bit and an Install DVD 64-bit from a [URL].
2. My plan is to install Opensuse 11.2 from the Live CD on an old 32-bit Dell Inspiron 7500 laptop (512 mb Ram) and dual boot it w/ Windows XP.
3. And then to install the 64-bit Opensuse 11.2 on a newer 64-bit Acer Ax1200 desktop (4 gig ram).
4. Is there a way to confirm that I have the correct 32-bit Live CD and a 64-bit Install DVD?
5. I tried looking at the "properties" of the Opensuse Install DVD while in XP, w/out seeing any obvious signal identifying 32 vs 64 bit.
6. I have a hunch that if I accidentally try to install the 64-bit version on my old 32-bit laptop, it would be a disaster.
View 1 Replies
View Related
Aug 20, 2010
i am new(fresher) for Linux Platform. i want to prepare for Red-hat Certification so Please tell me that how can i prepare to it & Please give me Exam dumps.
View 2 Replies
View Related
Mar 27, 2010
What can i do to prepare for job on linux?how can i prepare what should i read i rhce but still need to read more about qmail postfix and all?how get information about it?
View 13 Replies
View Related
Jul 14, 2010
I am now out of work for one year and am concentrating on getting more certifications to improve my marketability. What are your views on what employers would perfer? LPIC or Linux+ ?
View 14 Replies
View Related
Dec 22, 2010
Ran into an issue where there was a corrupt tar and nothing to do except revert to an even older one. Naturally I am then asked, can you confirm via crc or something that a tar was successful?I wish to tar / gzip some files and folders, will do them seperate, some are small, others can reach 5-7GB, but is there any way to rify aside from listing the contents that upon a tar completion that everything was fine?
View 2 Replies
View Related
Apr 14, 2010
I've installed Ubuntu Desktop Ed 9 and I want to add a user account that would be very restricted. I would only want them to access the internet and run several programs. I do not want them to have access to the destkop, anything under preferences, administration etc... Is this possible?
View 1 Replies
View Related
May 13, 2010
I'm currently running tests on my SAM file on my XP partition. Partly because I want a password that is hard to crack, and also out of curiosity. While running John the Ripper (no options used) I'm noticing that there are 8 pasword hashes, yet only 4 users associated with WinXP. I know that JTR only does 7(?) characters when it check for a solution. Is the 8 hashes because it separates passwords longer than 7 into 2 hashes, and then cracks them individually as 2 parts? I did try googling this,
View 2 Replies
View Related
Jun 9, 2010
I created a new user desktop user for my girlfriend to use my netbook, but when she logs in, it doesn't show the wireless network icon. Under users and groups, I gave her access to wired and wireless networks, and under the network settings,I changed our wireless to "available to all users". I'm not sure what the problem is here.I'm using ubuntu netbook remix 10.04.
View 3 Replies
View Related
Aug 30, 2010
I need to be able to capture a users password when they login. I am well aware of the security issues with this and I'm ok with this.
We run a call center and I am working on migrating from windows to Kubuntu for the callers. It's policy that all callers must report their password to me, so I already know of everyone's password. There has to be some variable/script that I can "hack" to get the password they typed in to the login screen.
What I'm trying to do is that when a user logs in in for the first time, their profile is automatically created and set up. Setting up network drives, email, pidgin (which the password is stored in plain text anyway, so forget about security on that one), web apps, etc.
Trying to find information on How to capture a users password and all have been responded with the usual lecture on why you shouldn't do this. So I've heard it all before and I know of the risks. Like I said, I already have the callers password on file. If I could capture it, I wouldn't have to manually setup each profile every time we get a new caller, which is often since turnover is quite high in call centers.
View 5 Replies
View Related
Jun 10, 2011
I set the profile for Firefox to enforce sudo aa-enforce firefox.Does this now apply to all users on my system or just the user I was logged in as?
View 2 Replies
View Related
Jan 7, 2010
I am writing an installation script that installs several packages using apt-get. Is there a way to run that command with some sort of option that makes it so the user doesn't have to type Y to confirm the installation? The user needs to be run the script as sudo
View 2 Replies
View Related
Mar 10, 2010
I am currently studying for the Linux plus comptia exam.
Yes, Im aware, The theme OS is Redhat. I am just wondering if there are any free practice exams for the linux plus certification out there. Any Ideas?
View 3 Replies
View Related
Mar 22, 2011
I know this does'nt work but how in my script would I get the script to confirm it's directory is in.
if [ $pwd -eq $LOG_DIR ];
then
echo "work"
[code]...
View 4 Replies
View Related
Apr 17, 2010
This is going to be my first post.I am doing RH-033 course. Can anyone tell me how to prepare for RHCE certification exam.
View 5 Replies
View Related
Mar 2, 2011
Experienced sys admin with over 20 years experience of Solaris and HP-UX, but limited Red Hat knowledge.
I dont want to do the basic linux courses and spend days learning how to use vi etc.
I was thinking of jumping straight in and doign the RHCSA Rapid track course or even the RHCE Rapid Track course.
Of course, if I ask Red Hat they'd tell me I had to do the courses before this.
Unfortunately, funds are limited (personal training grant) so its one course only.
View 14 Replies
View Related
Aug 5, 2010
My question is not related to technical one,
1.I completed my Post Graduation in 2008,after that as of my personal interest on Red Hat, i took course on that and completed the RHCE certification.
2.Now im looking 4 opportunities on Linux Admin,i would like to know the roles played by an Linux Admin in real time scenario,im looking for an System Admin.
3.What i mean to ask is, what type of daily tasks does Linux Admin will do? Let me know the answers if any one know dis.
View 2 Replies
View Related
Jan 6, 2011
Thought about posting in the Networking board, but I believe this is a much more security-oriented thread. So let's say I bring my computer to a public place, say a library with one open, public, shared wireless network. I connect to that network. Let's assume that everyone else who's connected is using Windows. Can they see my computer (through Network Manager or other software) and attack it (SYN flood or something)? Or does it depend on the network settings?
View 9 Replies
View Related
Mar 17, 2011
I have 2 servers, web server & mail server. they show 2 users in the summary area when I run w or top commands. But the actual list of users logged in (using either w or who) shows only 1 user.
ps -ef |grep username only shows my current login as a running sshd process.
So I can find no trace of this other user except in the summary line for w or top. I have no shells or other logins left running elsewhere or abruptly terminated, no gui sessions (these are servers), no tty logins. Do I have another user logged in? Has someone hacked me & covered up most of their trail? Why do these commands show 2 users when everything else points to 1 user?
View 9 Replies
View Related
Apr 12, 2011
I read the log
Code:
I found this print out:
Code:
The line in bold is the security issue. There is only 1 user account on the system. There should only be 1 user logged in, not 2 users logged in. The remainder of the log file lists 1 user logged in, for similar log output. 2 users logged in does not appear again in the log file.
Does the second line of bold indicate that an attempt was made to log in to the system using SSH?
There was an internet connection interruption (no service) around the time of the log file event. The service did return, later.
Does that line indicate that an unauthorized user logged in to the system?
View 3 Replies
View Related
Jun 23, 2011
I am stuck in a weird situation and could definitely use some help from gurus in security area.
I have categorized my users into 3:
1. root user
2. other local users
3. LDAP users
I want to setup following 2 usecases:
a)
1. Allow keybased ssh and scp to root users
2. Allow ssh but disallow scp service to other local users
3. Disallow ssh and scp to LDAP users
b)
1. Allow keybased ssh and scp to root users
2. Disallow both ssh and scp to other local users
3. Disallow ssh but allow scp to LDAP users
For the 1. in both cases, I think PermitRootLogin in sshd_config could . For the 3. I am thinking of deploying rssh to control scp service access, since ssh will be restricted anyways.
Problem area is 2. primarily.
i) How to allow ssh but disallow scp to 'other local users'
ii) How to disallow both ssh and scp to 'other local users'
View 5 Replies
View Related
Jul 14, 2009
I have a new server with Fedora 10. The root user can log in by SSH using an RSA key but for any other user the RSA key is ignored and a password required.Ultimately I wish to access an SVN server over SSH and would like to to have to keep entering a password. I have Googled this issue and found nothing.If I log on as root the /var/log/secure file shows that the key is accepted, for any other user no message is added and the password is requested.I have checked all the config files and as far as I can see they are all correct so I am at a complete loss as to why SSH will not use the users RSA key.
View 13 Replies
View Related
May 24, 2011
I want to restrict some of my Operating System users running unwanted commands. I just want them to run specified commands only. How can i achieve this?
View 9 Replies
View Related
Sep 19, 2010
I'm on Debian 5 - when I run the w command, it reports 2 users, but I'm the only person logged in. Is this cause for concern?
Code:
curos@histeria:~$ w
16:17:25 up 4 days, 11:56, 2 users, load average: 0.00, 0.00, 0.00
[code]....
View 2 Replies
View Related
Nov 23, 2009
yesterday installed a fresh OpenSuse 11.2. Since then the confirm buttons (OK / YES / ...) are not working, when clicking (mouse). An keyboard ENTER-press does work.
What is the problem? Is it an OpenSuse bug?
View 9 Replies
View Related