Terminus Logo  Secured by phpPhobos

Shadow Family   
  Login  - No Account?  Create One   
Search 
Saturday, 20 April 2024  -
News FeedRSS Feed
rss rdf  
  Home 
  Authentication 
 Documentation 
    Site Documentation 
    About me 
  Legal Notice 
 Applications 
    Web Links 
 Hobbies 
    RC Models 
    RC Batteries 
    Build blogs 
 Modules 
    Downloads 
    Weblinks 
 Blacklists 
    Blacklist 
    Blockout 
    DNS Blacklist 
 Registered Bloggers 
  Joerg's Blog 
 Gallery [Listing]
  > Diving 
  > Steampunk 
  > RC Planes 
  > FPV Drones 
  > Indy travels 
 FAQ  [ Topics  ]
 Common Linux problem... 
 Routerboard RBxxxAH 
 Apple Mac-mini 
 PHP Phobos 
 Stargate's Backup sc... 
 eBook Reader / PRS-5... 
 RC Models 
 Server in SolLan 
Terminus Links   [  Index  | Categories  | Sub.  | Search  | Doc. ]
Folder open  Security
  URL Van's Apache SSL/TLS mini-HOWTO     [  
View DetailsView details
 
]

 From Van: I recently had a need to setup a private directory on my web server that could only be accessed by a handful of selected people. The content also needed to be encrypted in transit. This mini-HOWTO details how I did this on a Red Hat 8.0/Apache 2.0.40 server using mod_ssl and OpenSSL (0.9.6b and higher). Here are the goals of this small project:
 

Added on: Thursday, 20 March 2008,  Hits: 3270 
Category: Linux - Security
spacer line
  URL Introduction into SSL the Ubuntu Way     [  
View DetailsView details
 
]

 This guide is designed to introduce the reader to the Secure Sockets Layer (SSL) application-level protocol, and particularly the OpenSSL implementation of SSL. After a brief description of exactly what OpenSSL is, and what it is useful for, the guide will further illustrate the practical usage of OpenSSL in a client-server environment, and provide specific examples of applications which may benefit from OpenSSL. Finally, the guide will lead the user through example procedures required to use OpenSSL with the popular Apache Hyper Text Transport Protocol (HTTP) server for the purpose of serving secured web pages from your Ubuntu computer.
 

Added on: Tuesday, 28 October 2008,  Hits: 2761 
Category: Distributions - Security
spacer line
  URL Wireshark Wiki pages     [  
View DetailsView details
 
]

 WireShark logoThis is the wiki site for the Wireshark network protocol analyzer. You can edit any page by pressing the link at the bottom of the page, see HowToEdit for details. If you want to try out wiki editing, you should use the WikiSandBox page. To learn more about what a WikiWikiWeb is, read about WhyWikiWorks and the WikiNature. Also, consult the WikiWikiWebFaq.
 

Added on: Friday, 30 November 2007,  Hits: 2491 
Category: Computers - Security
spacer line
  URL WireShark Capture Filters     [  
View DetailsView details
 
]

 WireShark logoAn overview of the capture filter syntax can be found in the User's Guide. A complete reference can be found in the expression section of the tcpdump manual page. Wireshark uses the same syntax for capture filters as tcpdump, WinDump, Analyzer, and any other program that uses the libpcap/WinPcap library. If you need a capture filter for a specific protocol, have a look for it at the ProtocolReference.
 

Added on: Friday, 30 November 2007,  Hits: 2290 
Category: Computers - Security
spacer line
  URL Hacking Linux Exposed     [  
View DetailsView details
 
]

 Hacking Linux Exposed logoIn Hacking Linux Exposed, we are able to cover Linux hacking in more detail than ever before. We are able to show you where Linux may differ from other Unix-like systems and give you Linux-specific countermeasures that you can implement immediately. In the hard-hitting style of Hacking Exposed, Hacking Linux Exposed once again dives into the actual attacks used by the enemy. Look no further for the actual exploitation techniques used to surreptitiously gain access to Linux systems.
 

Added on: Monday, 04 February 2008,  Hits: 1670 
Category: Linux - Security
spacer line
  URL  DROP (Don't Route Or Peer)     [  
View DetailsView details
 
]

 DROP LogoDROP (Don't Route Or Peer) is an advisory "drop all traffic" list, consisting of stolen 'zombie' netblocks and netblocks controlled entirely by professional spammers. DROP is a tiny sub-set of the SBL designed for use by firewalls and routing equipment.
 

Added on: Wednesday, 24 October 2007,  Hits: 1610 
Category: Linux - Security
spacer line
  URL Apache Web Server SSL Authentication     [  
View DetailsView details
 
]

 mod ssl picThis article describes configuration techniques of module mod_ssl, which extends a functionality of Apache HTTPD to support SSL protocol. The article will deal with authentication of server (One-way SSL authentication), as well as it will also include authentication of clients by using certificates (Two-way SSL authentication).
 

Added on: Monday, 07 September 2009,  Hits: 1608 
Category: Web Site - Security
spacer line
  URL Intrusion Detection Cheat Sheet     [  
View DetailsView details
 
]

 This is the Intrusion Detection Cheat Sheet. A quick reference every Admin should have an eye on - if something unusual happens. I usually always have this PDF somewhere handy - and if it's only online...
 

Added on: Tuesday, 09 October 2007,  Hits: 1391 
Category: Troubleshooting - Security
spacer line
  URL GRC's Ultra High Security Password Generator     [  
View DetailsView details
 
]

 Tact Monkey logoEvery time this page is displayed, the server generates a unique set of custom, high quality, cryptographic-strength password strings which are safe to use for WPA.
 

Added on: Monday, 03 November 2008,  Hits: 1192 
Category: Tools - Security
spacer line
  URL OpenSSL Command-Line HOWTO     [  
View DetailsView details
 
]

 The openssl application that ships with the OpenSSL libraries can perform a wide range of crypto operations. This HOWTO provides some cookbook-style recipes for using it.
 

Added on: Monday, 17 March 2008,  Hits: 1178 
Category: Linux - Security
spacer line
  URL Privacy Finder     [  
View DetailsView details
 
]

 Privacy finder logo Privacy Finder is a privacy-enhanced search engine. Once you state your privacy preferences (low, medium, high, or custom), the search results are ordered based on how their computer-readable privacy policies comply with your preferences. A privacy meter with four green boxes indicates that the website complies with all your privacy preferences. Websites that do not comply with some or all of your preferences will have privacy meters with fewer than four green boxes. The number of green boxes that are missing are proportional to the number of preference conflicts between the website's privacy policy and your privacy preferences. The absence of the privacy meter means that a valid computer-readable privacy policy, known as a P3P policy, could not be located.
 

Added on: Wednesday, 26 March 2008,  Hits: 1166 
Category: Tools - Security
spacer line
  URL Internet censorship wiki     [  
View DetailsView details
 
]

 Internet Censorship LogoThis is the english version of the Internet censorship wiki. We want to provide information about the different methods of blockings and ways to bypass them.
 

Added on: Monday, 04 February 2008,  Hits: 1134 
Category: Computers - Security
spacer line
  URL Debian router     [  
View DetailsView details
 
]

 Linux on a modern PC hardware is a very capable router and can achieve the same routing performance as Cisco 72**. But it never gained the same popularity as a router as it did as a server.
One reason is probably administrative: in a big IT department different teams are attending to connectivity and to services. This is natural work division but it has its drawbacks. The networking team would consider Linux routers as a project for the servers team (after all, it is Linux), and the servers team would rightfully think otherwise (it is, after all, networking). Usually both stay polite and mind their own business.
 

Added on: Thursday, 25 October 2007,  Hits: 1072 
Category: Linux - Security
spacer line
  URL WikiLeaks     [  
View DetailsView details
 
]

 WikiLeaks Logo... serves as an uncensorable and untraceable depository for the truth, able to publish documents that the courts may prevent newspapers and broadcasters from being able to touch.

Over the last few years, WikiLeaks has been the subject of hostile acts by security organizations. In the developing world, these range from the appalling assassination of two related human rights lawyers in Nairobi last March (an armed attack on my compound there in 2007 is still unattributed) to an unsuccessful mass attack by Chinese computers on our servers in Stockholm, after we published photos of murders in Tibet. In the West this has ranged from the overt, the head of Germany's foreign intelligence service, the BND, threatening to prosecute us unless we removed a report on CIA activity in Kosovo, to the covert, to an ambush by a James Bond character in a Luxembourg car park, an event that ended with a mere we think it would be in your interest to....
 

Added on: Monday, 29 March 2010,  Hits: 1010 
Category: Web Site - Security
spacer line
  URL Secure Password Generator     [  
View DetailsView details
 
]

 pc tools software logoThe PC Tools Password Generator allows you to create random passwords that are highly secure and extremely difficult to crack or guess due to an optional combination of lower and upper case letters, numbers and punctuation symbols.
 

Added on: Tuesday, 19 February 2008,  Hits: 1006 
Category: Tools - Security
spacer line
  URL Heise PGP Krypto Kampagne     [  
View DetailsView details
 
]

 Heise Security LogoKrypto-Kampagne

Zur CeBIT 97 hat c't erstmals einen kostenlosen Zertifizierungs-Service für PGP-Schlüssel angeboten. Diese WWW-Seiten informieren über den Ablauf und den Hintergrund der Kampagne.
 

Added on: Tuesday, 12 February 2008,  Hits: 991 
Category: Computers - Security
spacer line
  URL Engarde secure linux     [  
View DetailsView details
 
]

 En Garde Linux LogoThe Community Edition of EnGarde Secure Linux was designed to support features suitable for individuals, students, security enthusiasts, and those wishing to evaluate the level of security and ease of management available in Guardian Digital enterprise products. Its development is very much driven by not only the requests from the community, but also their continued participation.
 

Added on: Tuesday, 23 October 2007,  Hits: 974 
Category: Linux - Security
spacer line
  URL Insecure . Org     [  
View DetailsView details
 
]

 Insecure.org LogoWebsite maintained by the maker of NMap. Also links to other security related pages exist. Check it out if you need something for securing your system.
 

Added on: Monday, 26 November 2007,  Hits: 964 
Category: Computers - Security
spacer line
  URL XP Antispy     [  
View DetailsView details
 
]

 XP Antispy LogoThe xp-AntiSpy is a little utility that lets you disable some built-in update and authentication 'features' in WindowsXP. For example, there's a service running in the background which is called 'Automatic Updates'. I don't know what this service transfers from my machine to other machines on the internet, especially the MS ones. So I play it safe and disable such functions. If you like, you can even disable these functions manually, by going through the System and checking or unchecking some checkboxes. This will take you approximately half an hour. But why wast time when a little neat utility can do the same in 1 minute? This utility was successfully tested by lots of users, and was found to disable all the known 'Suspicious' Functions in WindowsXP. It's customiseable, but comes up with the Default settings, which are recommended. This utility is DONATIONWARE! This means, you don't have to pay anything for this program and you can give it to anyone who's interested in it, as long as you don't sell it. If you find this tool useful, and wanna gimme something back, think about donating a small amount of money.
 

Added on: Friday, 28 March 2008,  Hits: 958 
Category: Windows - Security
spacer line
  URL Honeytrap     [  
View DetailsView details
 
]

 Honeytrap is a network security tool written to observe attacks against network services. As a low-interactive honeypot, it collects information regarding known or unknown network-based attacks and thus can provide early-warning information.
 

Added on: Tuesday, 30 October 2007,  Hits: 943 
Category: Linux - Security
spacer line
  URL Shoreline Firewall (Shorewall)     [  
View DetailsView details
 
]

 Shorewall LogoThe Shoreline Firewall, more commonly known as "Shorewall", is a high-level tool for configuring Netfilter. You describe your firewall/gateway requirements using entries in a set of configuration files. Shorewall reads those configuration files and with the help of the iptables utility, Shorewall configures Netfilter to match your requirements. Shorewall can be used on a dedicated firewall system, a multi-function gateway/router/server or on a standalone GNU/Linux system. Shorewall does not use Netfilter's ipchains compatibility mode; as a consequence, Shorewall can take advantage of Netfilter's connection state tracking capabilities to create a stateful firewall.
 

Added on: Tuesday, 06 November 2007,  Hits: 941 
Category: Computers - Security
spacer line
  URL Help Net Security     [  
View DetailsView details
 
]

 HNS LogoHelp Net Security (HNS) is an online portal that covers all the major information security happenings. The portal has been online since 1998 and caters a large number of Information Technology readers specifically interested in computer security. Besides covering news around the globe, HNS focuses on quality technical articles and papers, vulnerabilities, various vendor advisories, latest viruses, malware and hosts the largest security software download area with software for Windows, Linux, Mac OS X and Windows Mobile.

Help Net Security web portal is published by HNS Consulting Ltd.
 

Added on: Tuesday, 05 February 2008,  Hits: 936 
Category: Computers - Security
spacer line
  URL Vyatta     [  
View DetailsView details
 
]

 Vyatta LogoVyatta has changed the networking world by developing the first commercially supported, open-source router and firewall solution. Vyatta solutions combine the features, performance, and reliability of an enterprise router and firewall with the cost savings, flexibility, and security of open source to introduce new levels of economics, choice, and control into the network
 

Added on: Thursday, 01 November 2007,  Hits: 934 
Category: Linux - Security
spacer line
  URL TrueCrypt     [  
View DetailsView details
 
]

 TrueCrypt LogoFree open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux
Main Features:

  • Creates a virtual encrypted disk within a file and mounts it as a real disk.
  • Encrypts an entire partition or storage device such as USB flash drive or hard drive.
  • Encrypts a partition or drive where Windows is installed (pre-boot authentication).
  • Encryption is automatic, real-time (on-the-fly) and transparent.
  • Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the documentation.


 

Added on: Tuesday, 11 March 2008,  Hits: 933 
Category: Tools - Security
spacer line
  URL CA Cert     [  
View DetailsView details
 
]

 CA Cert LogoThis group is about the non-profit project CAcert. The project is a community approach in running a certificate authority (CA) and it provides free SSL-, email and code-signing certificates for everyone. The purpose of this group are discussions among CAcert Users and Assurers (the people doing the identity checks within CAcert). Beside that, you can discuss all IT-security related topics, especially digital certificates and cryptography.
 

Added on: Sunday, 16 December 2007,  Hits: 930 
Category: Computers - Security
spacer line
  URL Qualys SSL Lab     [  
View DetailsView details
 
]

 Qualys LogoSSL Server Test

This free online service performs a deep analysis of the configuration of any SSL web server on the public Internet. Please note that the information you submit here is used only to provide you the service. We don't use the domain names or the test results, and we never will.
 

Added on: Wednesday, 02 February 2011,  Hits: 922 
Category: Tools - Security
spacer line
  URL SpamHaus     [  
View DetailsView details
 
]

 Spamhaus LogoWORKING TO PROTECT INTERNET NETWORKS WORLDWIDE
Spamhaus tracks the Internet's Spammers, Spam Gangs and Spam Services, provides dependable realtime anti-spam protection for Internet networks, and works with Law Enforcement to identify and pursue spammers worldwide.
 

Added on: Wednesday, 24 October 2007,  Hits: 883 
Category: Linux - Security
spacer line
  URL The Zfone Project     [  
View DetailsView details
 
]

 Zfone is a new secure VoIP phone software product which lets you make encrypted phone calls over the Internet. Its principal designer is Phil Zimmermann, the creator of PGP, the most widely used email encryption software in the world. Zfone uses a new protocol called ZRTP, which has a better architecture than the other approaches to secure VoIP.
 

Added on: Tuesday, 03 June 2008,  Hits: 883 
Category: Computers - Security
spacer line
  URL Linux Security     [  
View DetailsView details
 
]

 Linux Security logoLinuxSecurity.com was first launched in 1996 by a handful of Open Source enthusiasts and security experts who recognized a void in the availability of accurate and insightful news relating to open source security issues. Led by Dave Wreski, who currently serves as chief executive officer of Guardian Digital, this group has grown into a global network of collaborators who devote their time to gathering and publicizing the latest security news, advisories and reports relevant to the Linux community. Headquartered in Guardian Digital's offices in Allendale, New Jersey, LinuxSecurity.com's editorial and web development staff also creates feature articles, commentaries and surveys designed to keep readers informed of the latest Linux advancements and to promote the general growth of Linux around the world.
 

Added on: Tuesday, 23 October 2007,  Hits: 877 
Category: Linux - Security
spacer line
  URL Privoxy     [  
View DetailsView details
 
]

 Privoxy is a web proxy with advanced filtering capabilities for protecting privacy, modifying web page data, managing cookies, controlling access, and removing ads, banners, pop-ups and other obnoxious Internet junk. Privoxy has a very flexible configuration and can be customized to suit individual needs and tastes. Privoxy has application for both stand-alone systems and multi-user networks.
 

Added on: Thursday, 08 November 2007,  Hits: 846 
Category: Computers - Security
spacer line
  URL COMODO SSL Analyzer     [  
View DetailsView details
 
]

 COMODO SSL Analyzer analyzes a SSL configuration of a Web-Server
 

Added on: Thursday, 19 April 2012,  Hits: 839 
Category: Tools - Security
spacer line
  URL Tor: anonymity online     [  
View DetailsView details
 
]

 Tor project LogoTor is a software project that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Tor protects you by encrypting your communications and bouncing them around a distributed network of relays run by volunteers all around the world. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the Internet's TCP protocol.
 

Added on: Tuesday, 06 November 2007,  Hits: 816 
Category: Computers - Security
spacer line
  URL ClamAV Antivirus     [  
View DetailsView details
 
]

 ClamAV LogoClam AntiVirus is an open source (GPL) anti-virus toolkit for UNIX, designed especially for e-mail scanning on mail gateways. It provides a number of utilities including a flexible and scalable multi-threaded daemon, a command line scanner and advanced tool for automatic database updates. The core of the package is an anti-virus engine available in a form of shared library
 

Added on: Tuesday, 06 November 2007,  Hits: 763 
Category: Computers - Security
spacer line
  URL AnonOps Communications     [  
View DetailsView details
 
]

 anonymousAnonymous Blog page
Anonymous (used as a mass noun) is an Internet meme originating 2003 on the imageboard 4chan, representing the concept of many online community users simultaneously existing as an anarchic, digitized global brain. It is also generally considered to be a blanket term for members of certain Internet subcultures, a way to refer to the actions of people in an environment where their actual identities are not known

  • We are Anonymous.
  • We are Legion.
  • We do not forgive.
  • We do not forget.
  • Expect us.


 

Added on: Friday, 06 May 2011,  Hits: 684 
Category: Web Site - Security
spacer line
  URL Password Meter     [  
View DetailsView details
 
]

 Safety DetectivesUses a word to generate a password by replacing chars with the usual suspects required by security checking tools.
 

Added on: Tuesday, 12 November 2019,  Hits: 478 
Category: Tools - Security
spacer line
  URL Digital Attack Map     [  
View DetailsView details
 
]

 Digital Attack Map is a live data visualization of DDoS attacks around the globe, built through a collaboration between Google Ideas and Arbor Networks. The tool surfaces anonymous attack traffic data to let users explore historic trends and find reports of outages happening on a given day.
 

Added on: Tuesday, 16 June 2020,  Hits: 327 
Category: Tools - Security
spacer line
 
Problems to  webmaster(-AT-)solsys(-DOT-)org  - best viewed @ 1920bpp
This site is powered by phpPhobos v2.0b446
© J. Mertin smurphy(-AT-)solsys(-DOT-)org 
Icons - Copyright Breeze artists GPL 2+