Ubuntu Security :: Can Make New Algorithm For /etc/shadow

Aug 16, 2011

i use SHA-512 algorithm in the /etc/shadow File But i Want to use my lgorithm ..

how i can remove the sha-512 and use my algoritm ? Because no one can des encrypt it !! He Not Know the algorithm method

View 7 Replies


ADVERTISEMENT

Security :: What Is Most Effective Security Algorithm For VPN

Jun 6, 2011

i was wondering what is the best algorithm(encryption/decryption) can i use in implementing a VPN application the algorithm am seeking need to be pretty much secure and effective in terms of performance..

View 4 Replies View Related

Programming :: Which Is Scheduling Algorithm Which Will Make Thread O?

May 4, 2011

I have a timer thread, and when it expires, it sets a flag. The only problem is, if any higher priority thread comes in between, then the timer is not expired in real time.Thus i want to set a highest priority to my thread. Now, i know 2 algos, which can make my thread in real time are: SCHED_FIFO and SCHED_RR.

So, here are my queries: 1) Which scheduling algo is best suited for this purpose? 2) Is it guaranted to work in real time if i use that algo (you suggest in 1) and set the max_priority by getting the maximum settable priority for that particular algorithm using, int sched_get_priority_max(int policy);

View 2 Replies View Related

Ubuntu Security :: Algorithm Is Used With Full-Disk Encryption?

Oct 20, 2010

For some reason I can't find any documentation re: the algorithm(s) used by Ubuntu to encrypt the filesystem... Anyone know what it is?? AES?

View 2 Replies View Related

Security :: User Appear In /etc/shadow And Not /etc/passwd

Jul 28, 2010

In what cases would a user appear in /etc/shadow and not /etc/passwd

View 2 Replies View Related

Security :: Shadow Password Hashes - If My $id$ Was $5$, Which Is Sha256?

Apr 26, 2011

The /etc/shadow file contains an id of $1$, $2$, $5$ or $6$ to show the encryption method used.A salt follows this,followed by the password hash.When a user is created and a password is set, a hash is RANDOMLY generated and used as the salt to the password hash. Everytime that user logs in, login checks /etc/shadow for the $id$ and salt and runs the password given by the user through the hash mechanism ($id$) using the salt in /etc/shadow.So basically does login look at /etc/shadow for the $id$ and salt to create a hash with which to compare to the /etc/shadow hash?question 2 - If my $id$ was $5$, which is sha256, how would i go about changing this? Like is there a shadow.conf or crypt.conf or something? Can i change it per user?

View 2 Replies View Related

Security :: Shadow File Readable - MD5 Password Exposed

Jun 7, 2010

I noticed that our /etc/shadow file is readable on a patch I released for one of our in house linux boxes a while back ago. Could they use it to gain access the root account etc? Our passwords are all MD5 encrypted.

View 5 Replies View Related

Fedora Security :: Error - Cannot Read /etc/shadow: Permission Denied

Jan 20, 2010

This is weird, today I updated my system and while trying to visudo from single user mode got

"cannot read /etc/shadow: Permission denied"

which kept me from doing anything until I switched to file permissions of 400 on shadow, then back. Is this being experienced by anyone else or just me? /etc/security/limits.conf doesn't seem like it wants to change in enforcing mode either and I can't find any alerts to provide clues on the situation.

View 8 Replies View Related

Fedora Security :: SELinux Blocking Sshd Access To Shadow?

Mar 6, 2010

I'm trying to setup ssh access on my Fedora 12 laptop. I get the following error message in /var/log/secure when I try to login from another machine using ssh and the login is denied:

Code:

sshd[3025]: error: Could not get shadow information for <user>
sshd[3025]: Failed password for <user> from <ip> port <port> ssh2

If I do a 'setenforce 0' I can login and no error is logged.

View 10 Replies View Related

Fedora Security :: Generating Password Hashes Compatible With FC11/sha-512 Shadow File?

Jul 3, 2009

I've been trying to write php or perl code to generate the sha-512 password hashes in fedora. I've been unable to do the hashing which is encoded in the shadow file on fedora core 11. Does anyone have php or perl code which provides the hashing algorithm. (All of my attempts result in the encrypted hashing being longer than 86 character -- the length that crypt says the sha-512 should be)

View 3 Replies View Related

Fedora Security :: What Security Measure's Should Be Taking To Make Box Little Less Vulnerable?

Apr 7, 2009

I'm just curious as to what security measure's I should be taking to make my box a little less vulnerable? I'm still experimenting/playing with Linux, use the net, IM, download this and that and was wondering how secure fedora 10 was out of the box?

View 12 Replies View Related

Programming :: Implementation Of RSA Algorithm In C / C++

Aug 2, 2010

Can I know the implemention of RSA(Encryption and decryption) algorithm in C / C++.

View 1 Replies View Related

Programming :: MD5 Algorithm Implementation

Apr 27, 2011

I have a copy of the MD5 algorithm and I'm taking a look at the source. It's pretty interesting but there are a few things that I'm curious about and I was wondering if anyone a bit more intuitive than I could help me out.The function declarations in the MD5 files are a bit unfamiliar to me. There is a macro used called PROTO_LIST, which I'm still not sure as to what this thing is doing exactly, but it's littered everywhere throughout the source.The signature here isn't too unfamiliar to me with the exception of the position of the PROTO_LIST macro. So here is a function with an unnamed argument of type MD5_CTX*.To me, this resembles an initializer list found in C++ with constructors but I certainly don't think that is the case here. So my questions about this are (1) how is this legal code in C and (2) what functionality has the PROTO_LIST macro provided for the function?

View 3 Replies View Related

Ubuntu Security :: Make Tor Run Without The Gui?

Aug 31, 2010

how to make tor run without the gui i would like to run it on a seperate machine that doesnt have GUI but it doesnt want to start with out a X

View 9 Replies View Related

Ubuntu :: Printing - SpliX Compression Algorithm 0x0 Does Not Exist

Aug 20, 2010

I have printer whhich work perfectly on ubuntu desktop I shared it into network and trying to print from Mac and I'm getting the following error: "SpliX Compression algorithm 0x0 does not exist" Printer - Samsung SCX-4200

View 1 Replies View Related

Fedora :: How To Change CPU Scheduling Algorithm

May 3, 2011

I want to change linux scheduling algorithm for some of my processes but when I click on processes in ksysguard and click renice project, all of the processes use normal level cpu scheduling. Why is it such a thing and there is no priority?

View 2 Replies View Related

General :: Kernel Scheduling Algorithm

Sep 8, 2010

is linux kernel is priority preemptive kernel?if it is. where it is using round robin scheduling algorithm?when processes are scheduled for the processor process will be allocated as which sechudling alogorithm?

View 1 Replies View Related

Software :: Best Program To Write Algorithm?

Oct 5, 2010

What would be the best program to write my algorithm, before sending them to my teacher?

View 4 Replies View Related

Software :: Change The Algorithm Of A Node In Ns2?

Jan 3, 2011

there are 3 nodes..A,B and C. Node A wants to send information to Node B but it does so by sending it to Node C first which then sends to B. And similarly Node B sends to A. In this simultaneously C doesn't send to both A and B. This is the in built algorithm..but i want to change it to: A and B send their packets to C and C sends both these packets to A and B..by ORing... In the receiver side...node A can receive the wanted packet and also B. Where do i change the algorithm?

View 7 Replies View Related

Software :: Algorithm To Compare Images Via Web Application

Mar 30, 2011

I want some algorithm so that I can compare images via web application, (preferably in python)

View 2 Replies View Related

Programming :: Algorithm For Binary Frequency Search?

Jul 16, 2010

I've got a bit of an obscure question for you to test your brains a wee bit. I'm trying to implement a search program to find areas of high density in a binary string.

E.g.

Code:

[0001001010
0001110001
0000001000
1001000010
0101100100]

Where density is the number of 1's / number of digits with a maximum number of digits being the current number in a buffer (in this example 50). So for the example the density for the whole buffer is 15/50. But the density of Buffer[14..20]=[1110001]=4/7. So if looking for areas of density = 1/3 it would find the longest sequences of density over 1/3.So in the example. Buffer[4..9]=[100101]=3/6=1/2 which is above 1/3 but it is within the Buffer[4..48]=[100101000011100010000001000100100001001011001]=15/45=1/3

View 5 Replies View Related

Programming :: Self Configurable Diagnosis Algorithm / Tcl Script?

Sep 13, 2010

I have an algorithm guys called "Self Configurable Diagnosis Algorithm" but i don't have program for this.help me regarding that program and which type of Tcl script will be better suitable for that.

View 3 Replies View Related

Programming :: Template Algorithm For Std::vector And Std::string?

Sep 8, 2010

I have two functions:

Quote:

void func1(std::string &s)
{
s.clear();
}

[code]....

Is there a way to create one template function for both vector and string that would clear them?

View 4 Replies View Related

Ubuntu Security :: How To Make A Transparent Firewall

Apr 14, 2010

I'm involved in a project to students set up a network security training lab using vmware. I want to simulate (in a very rough way) scanning through a poorly configured router or firewall. The easiest way I can think of to simulate this is to use a linux vmware image with two virtual nic cards to act as a firewall with the attacker on the outside network and a domain controller, web server, and database server on the inside network.

I would like to start students off with a firewall script that exposes everything on their internal network to the attacker. Is there an easy way to (mis)configure iptables to do this?. The model I'm trying to replicate is something like this. Attackers were on a 10.10.x.x network, defenders were on a 192.168.x.x network. As an attacker I could nmap 192.168.x.x and see every machine and every service on the defenders side even if they moved a service to an unexpected location. how I can implement a similar configuration using a linux image as firewalls/routers in vmware?

View 1 Replies View Related

Ubuntu Security :: Can't Change Password / Make It Possible?

Jul 21, 2010

When I go the the Change Password dialog box and type my new password, the box seems to stall forever when I try to change my password. The Authenticate and Change password buttons are grayed out but the Close button still works and when I click on it the box will close without changing my password.

View 5 Replies View Related

Ubuntu Security :: Make Computer More Secure?

Dec 9, 2010

I have very little security and networking experience. What can I do to make my computer more secure?

View 5 Replies View Related

Ubuntu Security :: Make Port 80 Read-only?

Apr 3, 2011

I am running a ubuntu server for home use and am currently hosting a website for testing urposes I am worried because I have to leave my port 80 open for this to work. an Idea I have is to make it that port 80 is read only.

View 9 Replies View Related

Ubuntu Security :: Make Live CD Of System

May 3, 2011

I got BT's repo's set and ready to install, tho I haven't installed them all just yet cause I not wanna crash the system, so I guess what I am asking has anyone sucecfully done this and what are the specific risks here. I have uploaded crunch and that works fine if I do it manually from the command line. the kernal seems to be update-able as well to BT's Kernal, I am not sure if I should do this or not in fear it might crash the Ubuntu system somehow. I guess what I might do next is install everything but the Kernal and install the executable links to the drop down menu by hand per the menu structure.

What I would ideally want is to have all the functionality of BT in Ubuntu which is pretty close to where I am at. Also, when I am done I want to make a live CD of this system so that I not have to do this ever again as it is very time consuming. What program would be used for that? Would any of my user data transfere? I don't want my user data to be transferred to the live CD just the raw system data etc. Anyone done this and would like to chat via skype? that would be best, but I'll take any help I can get at this point. I am using Ubuntu 9.10 for all this.

View 1 Replies View Related

Ubuntu :: Security Software - Make It Safer ?

Aug 2, 2011

Is there any software i need ,to make it safer......

View 5 Replies View Related

Debian Configuration :: How To Encrypt Home Folder Using DES Algorithm

Jan 27, 2011

I want encrypt my home folder by using the DES? How to do it?

View 1 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved