Ubuntu :: Use Swat Securely From A Securely Location?

Aug 6, 2010

How can you use swat securely from a securely location?

View 1 Replies


ADVERTISEMENT

Debian :: How To Securely Erase HD

Feb 18, 2011

I have a Debian Squeeze installed on my old iBook G4 mid 2005. The computer has been giving me hard time and I want to sell it for parts. Before that however I'd like to erase the hard drive securely. Is there a software that this forum recommends for erasing hard drives completely and securely? Is there Linux equivalent for something like DBAN which can be installed on a CD and then boot the computer from it?

View 14 Replies View Related

Security :: Backup Securely With Rsync?

Jul 11, 2010

To copy from production to standby over the internet I use a cron job doing rsync -avze 'ssh -p 8022' --exclude-from= ....

My question is: should the cron job run on the production or the standby system. Root access to the remote system is given by a pass phrase-less ssh key. Currently I run rsync on the production system. I guess that it is more secure because the standby needs no ssh login to production. Running rsync on the standby would use less resources on production. I am concerned that in this case there would be pass phrase-less access from standby to production.

View 3 Replies View Related

Slackware :: Securely Browsing The Net � Using SOCKS?

Jan 30, 2011

I read this article:[URL]..(Alien for all packages and howto) but I have some doubts. Let's see if I understand correctly. In practice, we open a port (8888 for example) on the local PC on which you made a ssh tunnel to our server, right? Who resolves the dns? Our remote server? With this technique we are safe even from sending data through unencrypted protocols like hhtp (not https)? An administrator who wants to see what we visited what would see in his log?

View 2 Replies View Related

Ubuntu Security :: How To Setup Web-facing Ssh Server Securely

Oct 18, 2010

I have a small network at my office (3 workstations, 1 ubuntu desktop that I'm using as a file server). I'm using a WRT54G2 router for networking and internet connectivity. Here's what I'm trying to accomplish: I want to be able to access my little file server from home, across town. I think ssh might be the best way to go now. What I don't know: How do I set up the ssh server on my machine/network without compromising my network security and the security of my server? Do I just set up port/ip forwarding on my router, install openssh, and that's it?

View 9 Replies View Related

Ubuntu Servers :: Securely Route All Traffic On The Client?

Mar 22, 2011

I am running Ubuntu Server 10.10. I have installed OpenVPN using this guide I have set up everything correctly as this guide says, but I am having problems with the config file. I want to securely route all traffic on the client to the server, how ever the server will not start. My config is below:

Quote:

#################################################
# Sample OpenVPN 2.0 config file for #
# multi-client server. #
# #
# This file is for the server side #

[Code]......

The servers ip is 10.0.0.65 and I want to assign the clients the ip range of 10.0.0.200 to 10.0.0.20 When I try to start the server I get the message Fail.

View 8 Replies View Related

Fedora Networking :: NetworkManager Won't Connect Securely Under F10?

Feb 3, 2009

I loaded F10 up on my laptop a few nights back. NetworkManager connects via Ethernet just fine. It will also connect wirelessly, but only when security is disabled. I've been using 128-bit WEP.

When I try to connect using security, this is what appears in the log:

Code:
Jan 29 21:07:17 localhost NetworkManager: <info> Activation (wlan0) Stage 1 of 5 (Device Prepare) complete.
Jan 29 21:07:17 localhost NetworkManager: <info> Activation (wlan0) Stage 2 of 5 (Device Configure) starting...

[Code]......

View 2 Replies View Related

General :: How To Send A Large File Securely

Aug 28, 2011

I need to send large files from a Linux machine to another using cryptography. The sender machine knows the recipient IP but not vice-versa. I don't need strong cryptography and prefer higher-speed less-secure solutions.

There are no problems with presharing crypto keys but I'd prefer not dealing with SSH users creation.

I think to HTTP PUT over TLS, but I never had experience with it and I prefer to hear which are the possible solutions. I know that it can listen as a daemon but I don't know anything about cryptography. So pipeing with OpenSSL may be a solution.

View 2 Replies View Related

General :: Patch Redhat And Debian Securely?

Jan 25, 2011

How to patch redhat and debian securely ? I mean is there sth like in solaris live upgrade, when after upgrade sth goes wrong I can revert to previous state from before upgrade?

View 4 Replies View Related

Slackware :: Securely Start Non-root Services?

Jun 19, 2011

I run Slackware 13.1 on a small Pentium 4 box that runs a torrent client, game server, and a few more Internet-related scripts.

I see no point running these stuff with root priviledges, so I have this line in rc.local:

Code:
su user -c "/home/user/services/start-all.sh"

How secure is that command, su user -c? And what would be the right way to go with it?

View 8 Replies View Related

Ubuntu Security :: Securely Delete File In TrueCrypt Volume

Jan 4, 2011

This one being Ubuntu 9.10 (yes, I know I really should upgrade). I keep a number of confidential files in a TrueCrypt container which is a standalone file in my Documents folder. I'd like to delete some of these, but I want to do it as securely as I can, but I believe if I simply hit 'Delete' with the file selected it'll move the file to the Deleted Items folder. This, I assume, means that the file is taken out of the encrypted volume and stored unencrypted in the Deleted folder.

I've been reading a little about the Shred command, and there seems to be some question about whether it works effectively with a journalled file system; and since I have no idea whether I'm using a journalled file system, or how to find out, I'm treating Shred and other over-writing secure deletion tools as ineffective for now.

With this in mind, can anyone advise me how I can protect the file stored in the TrueCrypt volume, and delete it in place, without taking it out of the encrypted area? And, further to that, can anyone tell me whether in fact the file is actually secured while it's in the encrypted volume? For all I know, just opening the volume may result in copies being made somewhere (apart from RAM).

View 5 Replies View Related

Ubuntu Security :: Transferring Sensitive Data Quickly And Securely?

Jun 27, 2011

My company needs to send sensitive data across to another company, 800gb of .dpx. The way I have thought of is:
E-Sata/1TB WD black.
True-encrypted/ hw accelerated aes (3x machines being built with 2600k)
Sha1sum on each file.

The main goal is to make sure that
1. The files that were transferred off the server onto the drive, are exactly the same.
2. Secure.
3. Fast.

View 9 Replies View Related

Networking :: Transparently And Securely Identifying Clients On A Network?

Dec 12, 2009

following on from [URL] I was having a little think about how to make this concept more secure. its easy enough to separate known and unknown clients out via MAC address. but that system is easier to break than it is to set up either, sniff out a mac address already connected to the system, and spoof that address.or, more simply, set a static IP on your wifi device, and avoid the redirection completely. so, is anyone aware of a relatively straight forward setup that would allow me to identify clients on my network without relying on MAC address, would more forcefully separate out known and unknown hosts (vlan??). As well as doing so without alerting them to the fact, and without requiring known hosts to do anything special, or install software. Or requiring any more hardware than I have already. (hardware = a debian box with 2 NIC's acting as a gateway between all internal network, and the billion router which handles the outside world not getting in, and a WAP attached to the internal side of the network. also somewhere I have a wifi card that I could attach to the server to replace the AP) I assume some sort of authentication mechanism is required, but I dont know much more past that.

View 2 Replies View Related

Security :: Running Services Securely - Chroot And Virtualization?

May 26, 2011

I'd like to run a Tor relay, but am trying to understand the security implications. For some time I've run my torrent client in a VirtualBox virtual machine, which is run as a very non-prived user, bridges directly to The Internets, and writes to one directory on the host. My belief is this is about as secure as it can be, but am open to suggestion.If I run a relay in the VM it wouldn't be associated with my use of Tor as a client, which is fine since there is no technical need for them to be connected and it's desirable for security.I read that chroot jails can be broken, particularly when run as root, so I don't really trust that. Also studied a vserver, but it must share the network setup which doesn't strike me as isolated enough.

View 14 Replies View Related

General :: Mount A Windows File Share Securely (encrypted)?

Jan 15, 2009

I'd like to find a way to mount a windows file share securely (encrypted) as I'll be communicating over the Internet.

View 4 Replies View Related

General :: Ssh - Forward A Program Window From Laptop To Desktop Securely?

Jul 30, 2010

Can't I forward a program window from my laptop to my desktop securely, both running Linux?How to ssh -X an existing window program just like the 'screen' program does?This question came up with my friends when watching an episode of 24! "Almeida send me your screen"

View 1 Replies View Related

Programming :: Copy A File Securely To Remote Host In JAVA?

Feb 2, 2009

I am looking for an API in JAVA which gives me functionality to copy a file to remote host in secure manner like (SCP).

View 1 Replies View Related

Software :: Best Free Software To Securely Send Large File To Friend Over The Net

Mar 10, 2010

I am looking for good free software to send large files to a friend. I have tried Skype, but it was too slow, so I am looking for something that basically only uses the two PCs, some software, and no third party or server. We can figure out our IPs, if that would be a step to eliminating a 3rd party or service.

I have searched the internet for terms like P2P, private P2P, F2F, SFTP, etc., and I'm just more confused! What's free and rocks? It's not for music or multiple users, just for 2 users and big documents.

Software Requirements:

* Secure
* Free or open source
* Both Linux (for me) and Windows versions (for my friend)
* Good GUI, easy to use (no command line)

View 14 Replies View Related

Ubuntu Networking :: Use SWAT To Configure Samba.conf?

Jul 21, 2010

I am trying to use SWAT to better configure Samba.conf I have swat installed and working but it is missing the GLOBAL button which is its main configuration tool?

View 3 Replies View Related

Server :: How To To Install Swat Utility

May 25, 2010

I am using RHEL 9 I want to install swat utility on this,where i can download the RPMs of?

1. samba-comman
2. samba-utils
3. swat

View 1 Replies View Related

CentOS 5 :: Unable To Connect To Swat

Aug 24, 2009

I just installed swat, but I'm unable to connect. I read the "man swat" file and it says that I have to modify the /etc/inet.d/swat file, which in my install does not exist; however, I found the /etc/xinetd.d/swat file, and I edited setting disable=no, and also setting only_host=to my ip address. After that I restarted the server "service xinetd restart" because "service inetd restart" doesn't work, so I checked if the port was listening with netstat -l | grep 901. Again no service is listening on that port..

View 1 Replies View Related

CentOS 5 :: Connections Refused When Try To Use SWAT

Jan 28, 2010

I've got SAMBA and SWAP installed. I tried to localhost:901 and telnet localhost 901 And both connections tries were refused. I opened the port and even shut down iptables. What else do I need to do to use SWAT?

View 1 Replies View Related

Fedora Installation :: Configuration Of Swat And Samba ?

Jan 8, 2010

The configuration of swat and samba. I have tried the vi edit approach but there is no save option so after I edit it and close it, it just says the terminal is in the middle of a process and closing will kill it or something to that effect. Of course then it doesn't save the changes. That reminds me that I do su to root before I do this. I have also tried the pam edit in order to allow myself to log on to root from the gui but that doesn't work either. Am I missing something? I can't imagine how you are supposed to configure anything if it won't let you even in root. Would the fact that my user and root passwords are the same effect this in anyway? I'm desperate as this is for a school project and obviously I'm new to linux.

View 2 Replies View Related

General :: Config SWAT For Samba On Fedora 14?

Mar 23, 2011

Ive followed this:

[URL]

SWAT service is running
Firewall is disabled
disable is saved in this file.

Doesnt work. http://localhost:901

What to do to diagnose this? What to check?

View 1 Replies View Related

General :: Administer Each Of The Servers From One SWAT Instance?

Sep 16, 2010

I have a few different Linux servers with samba shares on each of them. Is it possible to administer each of the servers from one SWAT instance?

View 1 Replies View Related

Server :: Install And Configure Swat On Rhel5?

Jan 7, 2010

I want to install swat on rhel5. how to install it on rhel5.

View 1 Replies View Related

Server :: Make Changes To SWAT Html Files?

Jan 28, 2010

I want to make some changes to the SWAT browser interface, does anyone know where the html files reside? I am using Ubuntu hardy

View 1 Replies View Related

Software :: Tweak Wine To Play Swat 4?

Sep 25, 2010

I downloaded Swat 4 (legally) as well as wine, using all defaults I hoped it would work. (yeah right) After installing using wine, which worked great, I get an error when I try to play the game. Wine is trying to load the game from the Cd drive yet it's installed.

EDIT: forgot to mention that wine does recognize that I have installed the program to its virtual c drive.

View 5 Replies View Related

Ubuntu :: OpenMotif : Create Network Location Link As Local Filesystem Location?

Apr 26, 2011

I'm working with a program that uses Open Motif to create all of the widgets, including the Open File dialog box (obviously). However, Open Motif being kinda old-timey, 80's vintage, and for the most part now an abandoned project, it is quite clunky. So, actually what I need to do is to open some files located on my work server. I have already successfully connected to the relevant server directories with Samba, and with programs built with GTK+ (such as GIMP) I can open files across the network because I have created a bookmark in Nautilus, and those bookmarks appear in the Open File dialog box created by GTK+. Now, Open Motif is different: it doesn't see network locations, orNautilus shortcuts. When I type "smb://serveripyadayada" in the search folder, it really doesn't like it and complains. So, what do I do? Can I get somehow Open Motif to open a network location? Or can I do a run-around and place a shortcut in the file system that points to the network location?

View 2 Replies View Related

Ubuntu :: Nautilus Location Bar: How To Write Manually Location

Oct 30, 2010

I have been testing ubuntu 10.10 maverick, it has some nice features. Anyway I am missing the possibility of writing manually the folder you want to go on nautilus using the Location bar. It was used to have some kind of icon which you can click and it switched between graphich breadcrumbs or the location of the folder and you could changed it manually, you know what I mean?

View 2 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved