Ubuntu Security :: Secure Wipe USB Flash Device?
Feb 1, 2011
I tried to do 'srm', 'wipe', 'shred'... whatever terminal commands to securely wipe a '/dev/sdc' (USB flash device) but it says that the device is read-only. How should I go about securely wiping it ?
View 2 Replies
ADVERTISEMENT
Dec 1, 2010
I'm an Oracle DBA and started working for my current employer about 4 months ago. This past weekend an alert re: FS space brought my attention to /var/spool/clientmqueue (full of mail re: cron jobs) and the fact that sendmail is not running on our Linux servers.I'm told that the IT security team deemed sendmail too vulnerable so we don't run it.Aside from FS filling up and missing notification of issues with crontab entries, I'm concerned that we may be missing notification of potential issues. In other Unix/Linux environments I've seen emails from the print daemon when it experienced problems with specific jobs.
Are there other Linux facilities aside from cron and lpd that use email to advise the users of possible issues? Are there ways to secure sendmail or secure alternatives to sendmail? My primary need/desire is to make sure that emails regarding issues on the server get to the appropriate users. Secondary goal would be to have the ability to use mailx to send mail out. There is No need/desire to receive mail from outside.
View 1 Replies
View Related
Jul 24, 2010
I recently used a flash drive to try MeeGo on my netbook. Unfortunately, the application I used to write MeeGo to the flash drive created a new partition in a rather unusual format. The Ubuntu disk utility can't delete the partition, and GParted can't even see it. How can I completely wipe the flash drive from Ubuntu? I'd prefer not to install any additional software.
View 1 Replies
View Related
Jun 8, 2011
I'm selling my Dell Mini 10 that came with Ubuntu on it. I never really used it much, and the only sensitive things on it were some PHP files with MySQL passwords that I can change on the server if need be. I'm not familiar with command line at all, so I'm having trouble figuring out the best way to wipe the SSD. I already reinstalled the OS using the recovery disk from Dell which said it would 'delete' the contents of my hard drive. I'm not sure if the job it did is suitable. What's the best way for me to make sure my data can't be recovered? Is there anything with a GUI I can download to help with this?
View 9 Replies
View Related
Jan 25, 2010
I installed kdesvn. I then connected to my svn server. So far so good. Unfortunately because the connection is through svn it kept asking me for my password. I had put a password on the security locker, it was annoying. I googled how to wipe the security locker so I could reset the password. This is where my troubles start. I used rm ... /kde/path/to/locker
When I did this, kdesvn stopped asking for my password and times out with an error when trying to connect. I then uninstalled kdesvn and kompare, then used rm .. /kde. I then reinstalled kdesvn and the problem isn't fixed. How do I do a completely fresh installation of kdesvn + locker so that it will start asking for my password again?
View 2 Replies
View Related
Feb 17, 2010
I was reading a website about securely wiping data from your hard drive with wipe on the right click menu, when I stumbled across part of the article where it talked about journaling filesystems.Article
Quote:
There are three types of journaling: journal, ordered and writeback. Using shred, with an ext3 file system presents the user with the problem of secure deletion because it can only really be effectively used with ordered and writeback journals. It also lists ext4 as a journaling file system in the article, so I looked up the wikipedia page on it and I also found this:
Delayed allocationExt4 uses a filesystem performance technique called allocate-on-flush, also known as delayed allocation. It consists of delaying block allocation until the data is going to be written to the disk, unlike some other file systems, which may allocate the necessary blocks before that step. This improves performance and reduces fragmentation by improving block allocation decisions based on the actual file size. So I am confused about this delayed allocation thing. My thoughts are that ext3 and other journaling filesystems are bad to use with secure wipe when they are set on journal mode because that writes the file to the journaling sector as well as to the hard drive. Apparently, in ext3, the default was ordered mode. I would like to know if anyone has any idea if the ext4 file system on karmic 64bit is hazardous to the security of using the wipe command.
View 2 Replies
View Related
Sep 16, 2010
Is there a script I can use to send a command VIA terminal to wipe an entire machine of data? If for example there is an intrusion valuable data can be at risk, it would need to be erased.
View 14 Replies
View Related
Jul 11, 2010
I seem to be missing a secure.log or security.log file. I have Ubuntu 10.04 and can't find this file. I looked in the /var/log and ran a search command to no avail. Does anyone know where this file is or is it called something else. I'm looking for a file that logs any change to the security settings of the system.
View 1 Replies
View Related
Apr 14, 2010
i want to secure the USB port by any external device connection. so i need the code of detection of an external device when plugged in the USB port.
View 1 Replies
View Related
Jan 26, 2010
I set up my ubuntu server with iptables that only allows ssh in the input chain (and of course established connections) with only the mac adress of my laptop allowed to connect, set up a key with a long passphrase and installed pam_abl plugin. ICMP echo is blocked by default.
The only problem is i log all other attempts to connect to the server and i see a lot of traffic going to ports 445 and 5900.
My question is: Is there a possibility that these attempts could succeed and is there any way to further ensure this server?
View 9 Replies
View Related
Feb 11, 2010
A) Pc-bsd
B) Ubuntu
And also which OS is more reliable?
View 9 Replies
View Related
Mar 11, 2010
How can i secure grub 2.0 ? with grub 1 just do : grub-md5-crypt then we write password --md5 <crypted_password> in /boot/grub/menu.lst
View 9 Replies
View Related
May 10, 2010
Is it possible at all to secure transmission?
View 9 Replies
View Related
Jun 14, 2010
Newbie here,
I'm thinking of moving mostly to linux to get away from the security holes in Windows. And I have some questions...
How secure is Firefox for doing online banking?
Sometimes I have run into a situation where the bank doesn't support anything but Windows explorer when accessing my accounts. Can this be gotten around safely in Linux?
If so, How?
View 9 Replies
View Related
Sep 19, 2010
Is there any way to secure harddisk accessbility ? i want encrypt my hard disk, and partitions that ubuntu installed on that. is there a way ? i want deny all access to hard disk, just my own root account can have access to all.
View 9 Replies
View Related
Feb 19, 2011
Ok im new, i know apparmor is running. i was looking for firestarter but their isnt one.....how do i secure this server? i want a good firewall and some virus protection!. also do i need this?
View 9 Replies
View Related
May 25, 2011
I want to set up a website that hosts very confidential business information. The info needs to be accessed by multiple people in different geographical regions. The entire website would require the high security (ie: there are no little sections that are publicly viewable). While the site will be run with Ubuntu server, I will be hosting it in Amazon's EC2 cloud.
So, if I use the HTTPS protocol with an SSL certificate, am I pretty well reaching the most secure possible situation? Are there any concerns with using the EC2 solution? Obviously there are a LOT of variables involved with maintaining website security, but I want to know if HTTPS is the current best bet (in addition to all the "best practices" of securing a site) or if there is a more robust way of securing content.
View 9 Replies
View Related
Jul 27, 2011
what is the best option to securing server via firewall and iptables?
View 9 Replies
View Related
Feb 3, 2010
I am running UFW, which is set to deny everything but SSH on port 22, OpenVPN on port 1194 and HTTPS on port 443. SSH is set to only allow private key logins, and the root account is disabled. I have AppArmor running for all of my daemons (OpenVPN, Apache2, OpenSSH) and I have Fail2Ban running.
Is there anything else I can do to secure my server from the Internet (it is directly connected, there is no NAT between the Internet and my server).
View 4 Replies
View Related
Feb 4, 2010
If I need to get a file to someone I could place it on the server and somehow automate an email telling them there is a file available. They could login to the server based on their email address and a randomly generated key combination and down load the file.I also need it to preform the same function going the other way. Login into my server and place files going to me.
View 2 Replies
View Related
Jul 11, 2010
I seem to be missing a secure.log or security.log file. have Ubuntu 10.04 and can't find this file. I looked in the /var/log and ran a search command to no avail. Does anyone know where this file is or is it called something else.looking for a file that logs any change to the security settings of the system.
View 6 Replies
View Related
Aug 20, 2010
I always hear 'do NOT install anything from anywhere except the official repositories'. But I find a lot of great apps that are not included in repositories and would like to ask. How actually secure launchpad is? Are the codes reviewed by anyone? How do I make sure that a piece of software is not going to harm my Ubuntu? If I add a PPA for some program I won't going to check it's code every time it updates or am I being too cautious?
View 9 Replies
View Related
Sep 9, 2010
Is there a way to securely empty the trash bin without the need to type some shred command into consoles. My intentions is to be able to securely delete files when the 'Empty Trash' is used so to save the trouble of going to a console and doing some commands using shred.
View 5 Replies
View Related
Oct 8, 2010
A friend of mine has a private forum setup so he and I can communicate back and forth so we don't have to send emails. The link is a "https://" so I'm assuming it's secure. I'm a newbie to ubuntu and I have already switch 3 of my computers at home to ubuntu.
I'm using Ubuntu 10.04 and google chrome as my browser. When I log into his forum it pops up with a screen saying "The site's security certificate is not trusted" and I always click proceed anyways. I'm not worried about this because I'm 110% sure that it's his website that I'm trying to access. My question/problem is it also pops up with a little box telling me to enter my Username and Password every time. When I was using WindowsXP, I had to enter this info once and then I wouldn't have to enter it again.
View 4 Replies
View Related
Dec 9, 2010
I have very little security and networking experience. What can I do to make my computer more secure?
View 5 Replies
View Related
Feb 5, 2011
Is there a program already set up to do this? Probably similar to WASTE (URL...), though waste's client is currently unsupported on the newest version of ubuntu (make error having to do with char* or something). Preferably windows and linux supported. Another thing that could be of use would be a local ssh chat. For example someone connects to my box either as me or as another user and runs 'hiben' and a window (or i ran a command or something and have a window open for it) pops up that we can chat in. Something other than single line messages.
View 3 Replies
View Related
Apr 13, 2011
I recently installed Xubuntu on a 5+ year-old Acer Aspire laptop. In spite of how the root, swap and home are volumes in an LVM2 group on top of a fully-encrypted harddisk, it's quite swift this computer isn't for me, however; it's for my old man. It's been my pet project for the past few weeks, as an exercise in making Linux both highly secure and user-friendly, so that even a technophobe like him could use it without fear of identity theft if it ever gets lost or stolen. I recently shipped it off to him...
The weakest part of security, however, I fear may be the screensaver, which is why I ask. I've searched and searched and cannot manage to find any information on security hardening practices (apart from banal advice such as "always choose a secure password" and "never log in to an X-session as root"). What I want to know is, just how safe is a locked screen? Also...is it technically possible with the right tools to get a core dump of a running computer and thus extract the block device encryption key from memory? I know that your run-of-the-mill thief will just try hitting the power button and throwing in a livedisk, but hey, you never know. Edit: found. [URL] I guess I need to tell him how to set the BIOS password to thwart that sort of thing next time I talk to him on the phone...
View 3 Replies
View Related
Jul 6, 2011
Is my ssl connection secure if I'm going through a proxy. Is it possible to craft a malicious proxy to steal/crack authentication?
View 2 Replies
View Related
Jul 20, 2011
I have a minecraft server running on a P4 box running Ubuntu server 11.04 64bit. Now would it be secure, if I allowed ufw to allow outgoing? Or would this be a huge flaw someone could exploit?
View 6 Replies
View Related
Dec 23, 2010
How to Centos 5.5 very secure for mail server. how to its performance very fast.
View 2 Replies
View Related