Professional Documents
Culture Documents
(Guide) How To Ensure Linux, Internet, Web, Wireless and Physical Security
(Guide) How To Ensure Linux, Internet, Web, Wireless and Physical Security
Mars - 2013
FormerlyknownasAstaroSecurityLinux. TheAstaroSecurityAppliancescomeinthreeflavors:Hardware, softwareandvirtual. Inthevirtualappliancecategory,Astarooffersappliancesbuilt specificallyfornetworksecurity,mailsecurity,Websecurityand Webapplicationsecurity. VMwareReadycertfication. Configurablefirewall,intrusionprotection,DoSattackprotection, NATtools,VPN,IPSecRemoteAccess,LDAPauthentication integration,andbandwidthcontrol. SophosrecentlyacquiredAstaro. Sophosboastsover100millionworldwidebusinessusersinmore than150countries.
Firewalldistributionthatissmall,highly secureandeasytouse. ThePakfiresystem(packagesystem)isunique toIPFire Deliversupdatesandpackagesviaencrypted transferanddigitalsignatures. Easyaddoninstallation:Samba,NFS,mail services,antivirus,multimediaapplications, VoIPapplications,intrusiondetection,network tools,securitytools,backuptools..etc
BootsathinLinuxsystemfromaCDorUSB flashdrive. Itisn'tmeanttoberunfromalocalhard disk. Public,generalpurposeWebbrowsingand Allowsnotracesofactivityorbrowsing history. Providessecurebrowsingduringbanking transactionsorothersecuritysensitive sessions.
Security Distros : Live Hacking DVD Anethicalhacker'splayground(workbench). Fullygraphicaldesktopinterface(GNOME) Mostofthehackertoolsarecommand line(CDversion). YoucanuseanoldPentiumIIIorIVclass systemandaslittleas512MBRAM.
CalmAV - Anti-Virus
Nixory - Antispyware
Networkbasedbotnetdiagnosissystem. Tracksthetwowaycommunicationflows betweenyourpersonalcomputerandthe Internet. AvailableforLinuxandUnixbutnowthey havereleasedaPrivateTestReleaseanda PreReleaseforWindows. BotHunter2Web.pl:anaddonallows BotHuntertoprofileinfectionsintoweb pages.
Freesdiskspaceandguardsprivacy. Freecache,deletecookies,clearInternet history,shredtemporaryfiles,deletelogs, anddiscardjunk. Firefox,InternetExplorer,AdobeFlash, GoogleChrome,Opera,Safari,andmore. Shredfilestopreventrecovery Wipefreediskspacetohidetracesoffiles deletedbyotherapplications, MakesFirefoxfaster.
Deletingafile(rm)orreformattingadisk doesnotdestroyyoursensitivedata. Commandline Destroyfilessothattheircontentsarevery difficultorimpossibletorecover. shredaccomplishesitsdestructionby repeatedlyoverwritingfileswithdata patternsdesignedtodomaximumdamage Difficulttorecoverdataevenusinghigh sensitivitydatarecoveryequipment.
Filehosted(container) Partition/devicehosted
TrueCryptvolumescanbeencryptedusing8 algorithms:AES,Serpent,Twofish..etc
PackageofdiskencryptionsoftwareforLinux. Filesystemlevelencryption/fulldiskencryption. Storescryptographicmetadataintheheaderof eachfileencryptedfilescanbecopiedbetween hosts. Widelyused,asthebasisforUbuntu'sEncrypted HomeDirectory. NativelywithinGoogle'sChromeOST Transparentlyembeddedinseveralnetwork attachedstorage(NAS)devices.
Privateconversationsoverinstantmessagingbyproviding:
Secure Passwords
Secure Passwords
Secure Passwords
Secure Passwords
SystemLogViewerisagraphical,menu drivenviewertoviewandmonitorsystem logs. Easier,moreuserfriendlydisplayofyour logs. Liveviewthatautomaticallyrefreshes(Xorg, auth,bot,boot.log,bootstrap.log,btmp, daemon.log,debug,dmesg,dpkg,fontconfig, jockey,kern,lpr,mail.err,mail.info..andmany otherlogfiles)
Physical Security
Webography
https://securityinabox.org/en http://www.serverwatch.com/server-trends/10-secure-linux-distributions-you-needknow-about.html https://securityinabox.org/en/keepass_portable http://www.truecrypt.org/docs/?s=version-history http://www.linuxlinks.com/article/20100226123455346/ddrescue.html http://www.ubuntugeek.com/tools-to-delete-files-securely-in-ubuntu-linux.html http://bleachbit.sourceforge.net/ http://www.cypherpunks.ca/otr/ https://www.torproject.org/ https://www.computerworld.com/s/article/82883/Secrets_to_the_best_passwords https://en.wikipedia.org/wiki/Information_entropy https://en.wikipedia.org/wiki/Password_strength http://ecryptfs.org/about.html http://linuxaria.com/article/free-open-source-rootkit-and-malware-detection-tools? lang=en&utm_source=feedburner&utm_medium=email&utm_campaign=Feed %3A+Linuxaria_En+%28Linuxaria%C2%BB+English%29 http://linuxaria.com/article/monitor-your-bandwidth-from-the-linux-shell?lang=en
Linux/InternetSecurity
Thanks..
AymenAmri amri.aymen@gmail.com twitter.com/eon01