Ubuntu Security :: Set Up Password Protection For Specific Applications?
Jul 2, 2011
is there a way to make a password key-ring for a list of specifications, specifically; all the applications relating to preferences. I'm running Ubuntu 11.04, I'm the only user, I disabled all login password requirements because they were annoying me and I'm cool with anybody using any of my applications as long as they aren't capable of changing my system in any way. Some of the applications I would like to be on the list include the terminal, the network connections preferences, the keyboard preferences. I wan't to be prompted for a password before opening these programs
View 4 Replies
ADVERTISEMENT
Jan 7, 2011
I don't know if this is Just my Machine, or not. But here is it:
Ubuntu 10.01
Acer Aspire 7740
When the computer is locked. I can smiply go to switch users. when the list of users logins are shown all i have to do is click on my user name and it allows me into my account without typing in a password. I can lock the computer manually or wait for it to time out it doesn't matter. the switch users method allows me to bypass the password protection.
View 3 Replies
View Related
Feb 23, 2011
I tried installing F-prot's linux scanner but it doesn't seem to want to install and I am tired of messing with it.
So I am wondering if I even need it or if there is something else.
I am behind a firewall already with my router if that helps any.
I guess I am having trouble understanding why virus protection is less necessary.
Do people not write viruses for linux systems?
View 7 Replies
View Related
Apr 20, 2011
In order to save power,I want to leave the default(blank) screensaver active,in case I forget to close my monitor when the computer is running.However,the screensaver is,by default,password protected and I would like to disable this annoying feature(which is,anyway,useless for me).If I go to System>Preferences>Screensaver and uncheck "Lock screen when scrensaver is active",will this remove password protection from the screensaver?
View 2 Replies
View Related
Apr 19, 2011
How can I use password protection with the tar command in Linux? I'm new to Linux so please explain to me with simple usage.
View 2 Replies
View Related
Aug 7, 2011
I have an acer aspire one running linpus
Generally I'm very happy with it apart from not being able to run some of the software I use but I do like the linux system.
Now, though, I find that it is progressively holding me back as more and more things I want to do require a change that involves the password protected access and I don't know it.
I tried 000000 and 111111 I don't know if anybody knows another default password. It maybe I did change it but I have no idea what to.
View 14 Replies
View Related
Sep 1, 2011
How I make a password to delete protection and open a folder?
View 2 Replies
View Related
Sep 1, 2010
I use Firefox's built-in password saving utility, which is great. However, for some Web sites, I never get the option to save the password. Googling indicates that Firefox somehow gives Web sites a means of disabling password-saving.
How do I disable this "feature"? (Preferably without installing a plug-in.) It's irritating. I should get to decide whether or not I want passwords saved, not some stupid Web Master who thinks he knows what is best for the world.
View 2 Replies
View Related
Jan 22, 2010
I installed TrueCrype 6.3a on my 8.1 Ubuntu. Everything went fine until I got to the part where I need to protect my hidden volume from damaged caused by writing to the outer volume (these instructions: [url] ). I can't find the checkbox to "Protect hidden volume from damaged caused by writing to outer volume". The closest thing I can find is an option to "Protect hidden volume when mounting outer volume". Intuitively these don't sound the same to me. There are 2 difference between my setup and the instructions; 1) the instructions appear to be written for Windows and not Linux. 2) I am using a file volume and not a partition volume.
Does anyone know where the option is to protect the hidden volume when writing to the outer volume?
View 2 Replies
View Related
Oct 3, 2010
I've recently installed Ubuntu 10 on my laptop and I'm not sure whether it's safe or not. My question is do I need any antyvirus or firewall to protect my pc against virus, spyware etc.?
View 9 Replies
View Related
May 15, 2011
When surfing the net do you need virus protection? And if so what do you recommend?
View 9 Replies
View Related
Feb 24, 2011
I work in a relatively small organisation of about 30 people (but with a complex network) and we've been looking to move our firewall to Microsoft's Threat Protection Manager on a mostly Windows network. I've been thinking we should have an IDS/IPS inside the firewall and I've been thinking about Snort in NIDS mode but have some basic questions:
1. Can anyone recommend a good web GUI for Snort?
2. Is it advisable to run both on the same machine? (Both from a POV of security and resources.)
3. Would Snort add any real benifit to using TPM?
View 2 Replies
View Related
May 6, 2010
So I forgot how to do something in Compiz and I quickly Googled it to find the answer. On the first or second link I clicked, a pop-up box opened from Firefox saying that I should scan my computer. Immediately, I pressed the X button, but a page started to load that tried to "scan" my computer. I closed out Firefox and re-opened it. I did the exact same search again on Google, but I clicked on the cached view of the site. It was harmless enough--a blog with some ads on the side of the page. I'm assuming that it was one of the ads that somehow must have taken over the page.
Anyway, I know that the discussion of anti-virus programs is not anything new, but I would like to know if this virus may have affected Ubuntu. What would you guys recommend in this case?Also, after running the update manager, I received a pop-up box asking if I would like to update Grub. Is this a normal part of the update, or could it be a virus? I'm a bit paranoid, being from the land of Windows.
View 6 Replies
View Related
Dec 18, 2010
Using Windows, I always set a Restrictive firewall policy with a third party firewall. But I also had all ports set to Stealth, something that appears to not offer any security benefits (as I've learned from reading Ubuntu forums). I'd like to learn about best security practices (under Ubuntu) for outgoing firewall protection. I will be using the built-in Ubuntu firewall that is configured via Firestarter. Outgoing filtering offers privacy as well as security benefits. But I thought I needed my ports stealthed to be safe too, so I'm open to learning new things.
I wanted to start a poll to find out how many folks use permissive/restrictive, but no polls allowed here apparently.Could Ubuntu users knowledgeable about firewalls enlighten me on whether I should go Outbound-Restrictive and what applications I will need to allow so Ubuntu "housekeeping" is not affected negatively? I basically just use the internet for software updates, web-surfing and e-mail. One question I have is whether there is something comparable in Ubuntu to Window's "DNS Client" service? I always disabled Window's "DNS Client" and forced each application to request port 53 DNS lookups itself.I only had to allow four programs to accomplish all internet traffic that I engage in. I set all other programs/applications to be either Blocked or to have to Ask for an outgoing connection as needed.Here is my former Windows XP setup:
svchost.exe: allow UDP for ports 53, 67, 68, 123 (time) and TCP for ports 80, 443
Avast: allow UDP for port 53 and TCP for port 80
firefox: allow UDP for port 53 and TCP for ports 80, 443
IE: allow UDP for port 53 and TCP for ports 80, 443
View 9 Replies
View Related
Aug 26, 2009
I have been trying to find a virus protection software that will integrate with my kernel 2.6.16.60-0.42.4. I tried Linuxshield, but the version of kernel I have is too new. I spent two days trying to make it work, but it gives me an error continually, no matter what I do when I try to install it. If there is anyone on the same kernel version that has had success with a virus protection software.
View 11 Replies
View Related
Mar 17, 2010
I'm using win XP and windows 7, meanwhile, I want to install ubuntu on my desktop (not very recent: 256MB RAM, 2.8Ghz), I'm thinking about installing ubuntu 9.10, but I use a lot of specific application:
-Matlab (I want to know wich will be a good replacement as I need my files to be compatible with matlab: octave or scilab)
-Visual studio (I think netbeans is good but wondering if there is any better application)
-Proteus ISIS (I don't know any linux application to do the same work)
-Modelsim (simulation for VHDL) and the same, I don't know any good replacement
-Xilinx (for validation and compilation of VHDL file and also creating test bech files)
-step 7 for Siemens automates programming (I don't know if there is any linux program related to this)
(I already use open office and foxit for general use in windows so I'm going to install them on ubuntu too).
View 3 Replies
View Related
Jun 17, 2011
I am running a windows game on Ubuntu through Wine, but it is running slowly. My computer is only a year and a half old, and it has 4 GB's of RAM. Is Wine not receiving enough of the memory? If so, can I direct a larger amount of my ram to the program?
View 1 Replies
View Related
Oct 18, 2010
I have a lot of application scheduled to load at startup (GoldenDict, Tomboy Notes, Evolution Mail, Liferea, etc.) and I'd like some of them to appear on the workspaces different from the default. I have Ubuntu 10.10 with Gnome and Compiz effects. Is there a way to do this without a lot of mess?
View 5 Replies
View Related
Oct 26, 2010
I have two applications that I would like to always open up in Workspace 2, even when i restart my computer. Is there a GUI solution that can do this? One of the apps is the Sound Preference window I would like set to open with the input tab selected.
View 1 Replies
View Related
Dec 24, 2009
If I am correct there is an official list(probably by Fedora itself) of packages/software included in each Fedora version, but I can't find it. I also have a couple of queries below.
1. There are always new applications, packages, games etc. being released for Fedora by open source developers and companies. Is there a good website where I can get a list of all these new packages etc, if possible an official one? I visit some sites such as Linux.com, but based on your own experience, I think you can guide me better.
2. In order to know which packages are installed on the Fedora machine one can type the following command, is that right?
Code:
rpm -qa
And this one gives the exact number of installed packages.
Code:
rpm -qa | wc -l
View 4 Replies
View Related
Jul 11, 2010
Is it possible to bypass kdewallet manager for certain applications while leaving it in place for others? Specifically, I do not want to be prompted to open the wallet when I login and initially access the wireless network, but still require opening of the wallet to check email.
View 6 Replies
View Related
Jun 15, 2011
I have a workstation dedicated to monitoring. The goal is to have multiple web sessions and other applications running across dual screens on multiple virtual desktops. I have a nice Perl/TK/wmctrl script that will automatically rotate the desktops. All is working great.
The problem is, I need a solution to automatically start the applications on the correct desktop, with the correct window size, in the correct location on the desktop. That way we can start the monitor boxes in the morning and have everything start in the correct place. It is a really cool effect to have wall mounted monitors with cube rotation showing off multiple graphs and more.
Do any of you pros know how to start an application with a specific window size and define where on the desktop it is placed? The box is running OpenSUSE 11.4 KDE. Is that kind of control possible?
View 1 Replies
View Related
Apr 7, 2011
Just like the title says, it always asks me to go to the direct path.
ie:
iwconfig doesn't work. I have to type /usr/sbin/iwconfig
View 2 Replies
View Related
Jun 14, 2011
everytime i try to vnc to my box, it pops up the keyring authentication, which is obviously a huge problem when logging in remotely.how do i change my keyring password to match my login password?
View 4 Replies
View Related
Oct 22, 2010
I know this has probably been asked too many times here but I need to secure my emails. Personal matters of course. But yeah. I use the program "Password and Encryption Keys" to generate a key to sign my emails with but I do not know what to do. To be blunt, I'm stupid when it comes to this. IF not, steps in creating a key? and giving it (my public key) to the significant other? Finding where both keys are? Implementing it into Thunderbird? If it helps any here's some extra information: Ubuntu distro: Ubuntu 10.04 Email client: Thunderbird
View 7 Replies
View Related
Jan 13, 2010
How can I force passwd to use a simple password?I want to change my passwd & delete passwd history (if stored).I plan on creating a Virtual Appliance that uses another password besides my testing password.
View 5 Replies
View Related
Aug 3, 2010
I already posted a topic similar to this concerning the Desktop OS version, but this deals with the Netbook because unlike the Desktop, the Netbook is less cooperative. Allow me to elaborate: Today (or rather yesterday since it's not after midnight where I am), I changed my password because I was hopelessly confounded about how to get my Wireless Network card up and running after it had been installed and I was allowing my dad to use it. This issue has since been resolved, however...
When I chose my password during the original installation, there was no mention of it being "too simple." This is where the Desktop OS and the Netbook OS differ. The desktop will let me change it in the terminal without any errors. The Netbook will not. When I've attempted to revert it back to the original, it will not let me do so in the User Profile or in the Terminal. The Passwords and Encryption Keys application also does not appear to help.
So now even after I've changed it to a different "complicated" password I am still prompted to insert two different passwords since I changed my user password but I am unable to change the password I input during the installation. A bit screwy methinks. This is extremely important. I'd like to know how to change the original installation password.
If I can't change the main password on my laptop then this is a serious potential security breach just waiting to happen (especially since it's on a laptop and I will be hauling it around with me) and I will most likely install a different OS if this isn't resolved --- It would be very unfortunate since I spent the whole day fixing it and I really enjoy the interface. Luckily I can live with this on my Desktop since I'm not going to be hauling it around with me everywhere when the school year starts.
View 9 Replies
View Related
Oct 1, 2010
I have a database created by an older program (not Access) that I need to open and retrieve information for my business. The manufacturer put a password on there so that only it's program could open it. I do not use that program, but it has information I need. Is there a way to find that password or circumvent the password altogether?
View 1 Replies
View Related
Feb 11, 2010
I have enabled ssh key based logins for one of my servers and disabled normal password based logins. It just occurred to me that the public key which I generated on my pc, and uploaded to the servers authorized_keys, may in fact only apply to my local PC / user account. So basically if my system crashes I would have no way to login to the server...? Is it not possible to "share" public keys so other people (PCs / accounts) can use them?
View 3 Replies
View Related
Apr 7, 2010
I want to restrict SSH so that its only accessible via the machines I own on this network. Obviously need to secure user authentication/host authentication, that aside though is the following sufficient at a network level given technical users also use this network? IP addresses are static, though I know they could be spoofed.
Code:
Chain INPUT (policy DROP)
target prot opt source destination
existing-connections all -- anywhere anywhere
allowed all -- anywhere anywhere
[Code]....
View 4 Replies
View Related