Security http://www.linuxjournal.com/taxonomy/term/31/0 en Tor Security for Android and Desktop Linux http://www.linuxjournal.com/content/tor-security-android-and-desktop-linux <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/tor-security-android-and-desktop-linux" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/orbot-07.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="355" /></a> </div> </div> </div> <!--paging_filter--><h3> Introduction</h3> <p> Internet service providers in the United States have just been <a href="https://www.nytimes.com/2017/03/29/opinion/how-the-republicans-sold-your-privacy-to-internet-providers.html?_r=1">given the green light</a> to sell usage history of their subscribers by <a href="https://www.congress.gov/bill/115th-congress/senate-joint-resolution/34/all-info">S J Res 34</a>,<span class="read-more"><a href="/content/tor-security-android-and-desktop-linux"> more>></a></span></p> Android Desktop Security Tails Tor Wed, 12 Apr 2017 15:32:53 +0000 Charles Fisher 1339360 at http://www.linuxjournal.com Simple Server Hardening, Part II http://www.linuxjournal.com/content/simple-server-hardening-part-ii <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/simple-server-hardening-part-ii" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/security-1202344_640_7.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="113" /></a> </div> </div> </div> <!--paging_filter--><p> In my <a href="http://www.linuxjournal.com/content/simple-server-hardening">last article</a>, I talked about the classic, complicated approach to server hardening you typically will find in many hardening documents and countered it with some specific, simple hardening steps that are much more effective and take a only few minutes.<span class="read-more"><a href="/content/simple-server-hardening-part-ii"> more>></a></span></p> HOW-TOs Security Servers SysAdmin Tue, 11 Apr 2017 12:17:17 +0000 Kyle Rankin 1339355 at http://www.linuxjournal.com Flat File Encryption with OpenSSL and GPG http://www.linuxjournal.com/content/flat-file-encryption-openssl-and-gpg <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/flat-file-encryption-openssl-and-gpg" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/computer-1294045_640.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="200" /></a> </div> </div> </div> <!--paging_filter--><p> The Pretty Good Privacy (PGP) application, which has long been known as a primary tool for file encryption, commonly focused on email. It has management tools for exchanging credentials with peers and creating secure communication channels over untrusted networks.<span class="read-more"><a href="/content/flat-file-encryption-openssl-and-gpg"> more>></a></span></p> Encryption GPG HOW-TOs OpenSSL Security Tue, 04 Apr 2017 09:46:42 +0000 Charles Fisher 1339346 at http://www.linuxjournal.com smbclient Security for Windows Printing and File Transfer http://www.linuxjournal.com/content/smbclient-security-windows-printing-and-file-transfer <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/smbclient-security-windows-printing-and-file-transfer" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/security-1202344_640_5.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="113" /></a> </div> </div> </div> <!--paging_filter--><p> Microsoft Windows is usually a presence in most computing environments, and UNIX administrators likely will be forced to use resources in Windows networks from time to time. Although many are familiar with the Samba server software, the matching smbclient utility often escapes notice. <span class="read-more"><a href="/content/smbclient-security-windows-printing-and-file-transfer"> more>></a></span></p> Encryption Microsoft Networking Samba Security Servers SysAdmin Tue, 28 Mar 2017 12:53:56 +0000 Charles Fisher 1339335 at http://www.linuxjournal.com Hodge Podge http://www.linuxjournal.com/content/hodge-podge <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/hodge-podge" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12082f3.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="200" /></a> </div> </div> </div> <!--paging_filter--><p> For every article, I try to write something that is interesting, entertaining, educational and fun. Sometimes I even succeed. Many other times I have some things I'd like to talk about, but there's not enough of it to fill the space. This time, I decided a disjointed hodge podge would be the theme. So let's just have a virtual nerdy talk about stuff, shall we? <span class="read-more"><a href="/content/hodge-podge"> more>></a></span></p> http://www.linuxjournal.com/content/hodge-podge#comments Bitcoin Mobile Networking Security Servers Storage Tue, 21 Mar 2017 14:33:01 +0000 Shawn Powers 1339323 at http://www.linuxjournal.com William Rothwell and Nick Garner's Certified Ethical Hacker Complete Video Course (Pearson IT Certification) http://www.linuxjournal.com/content/william-rothwell-and-nick-garners-certified-ethical-hacker-complete-video-course-pearson-it- <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/william-rothwell-and-nick-garners-certified-ethical-hacker-complete-video-course-pearson-it-" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12150f5.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="240" /></a> </div> </div> </div> <!--paging_filter--><p> Watch William Rothwell and Nick Garner's new <em>Certified Ethical Hacker</em> (CEH) Complete Video Course and learn everything you need to know to ace the CEH exam in less than 11 hours. <span class="read-more"><a href="/content/william-rothwell-and-nick-garners-certified-ethical-hacker-complete-video-course-pearson-it-"> more>></a></span></p> http://www.linuxjournal.com/content/william-rothwell-and-nick-garners-certified-ethical-hacker-complete-video-course-pearson-it-#comments HOWTOs Products Security Mon, 20 Mar 2017 13:49:33 +0000 James Gray 1339319 at http://www.linuxjournal.com Preseeding Full Disk Encryption http://www.linuxjournal.com/content/preseeding-full-disk-encryption <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/preseeding-full-disk-encryption" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/security-1202344_640_4.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="113" /></a> </div> </div> </div> <!--paging_filter--><p> Usually I try to write articles that are not aimed at a particular distribution. Although I may give examples assuming a Debian-based distribution, whenever possible, I try to make my instructions applicable to everyone. This is not going to be one of those articles.<span class="read-more"><a href="/content/preseeding-full-disk-encryption"> more>></a></span></p> http://www.linuxjournal.com/content/preseeding-full-disk-encryption#comments Encryption HOW-TOs Security Thu, 16 Mar 2017 17:48:18 +0000 Kyle Rankin 1339317 at http://www.linuxjournal.com Minifree Ltd.'s GNU+Linux Computers http://www.linuxjournal.com/content/minifree-ltds-gnulinux-computers <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/minifree-ltds-gnulinux-computers" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12150f3.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="110" /></a> </div> </div> </div> <!--paging_filter--><p> <a href="http://minifree.org">Minifree Ltd.</a>&mdash;doing business as "Ministry of Freedom"&mdash;exists mainly for reasons Linuxers will like: to make it easier for people to get computers that respect their freedom and privacy, and to provide funding for a meaningful project, called Libreboot. <span class="read-more"><a href="/content/minifree-ltds-gnulinux-computers"> more>></a></span></p> http://www.linuxjournal.com/content/minifree-ltds-gnulinux-computers#comments Hardware Products Security Mon, 13 Mar 2017 12:19:16 +0000 James Gray 1339315 at http://www.linuxjournal.com Two Factors Are Better Than One http://www.linuxjournal.com/content/two-factors-are-better-one <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/two-factors-are-better-one" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/security-1202344_640_3.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="113" /></a> </div> </div> </div> <!--paging_filter--><p> Although I've always been interested in security, there are just some security measures I've never liked.<span class="read-more"><a href="/content/two-factors-are-better-one"> more>></a></span></p> http://www.linuxjournal.com/content/two-factors-are-better-one#comments HOW-TOs Security ssh Thu, 09 Mar 2017 13:12:03 +0000 Kyle Rankin 1339308 at http://www.linuxjournal.com SSH Communications Security's Universal SSH Key Manager http://www.linuxjournal.com/content/ssh-communications-securitys-universal-ssh-key-manager <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/ssh-communications-securitys-universal-ssh-key-manager" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12131f8.png" alt="" title="" class="imagecache imagecache-node-page" width="200" height="109" /></a> </div> </div> </div> <!--paging_filter--><p> Today's IAM solutions, warns enterprise cybersecurity expert <a href="http://ssh.com">SSH Communications Security</a>, fail to address fully the requirements of trusted access. Organizations lack an efficient way to manage and govern trusted access credentials and have no visibility into the activities that occur within the secure channels that are created for trusted access operations.<span class="read-more"><a href="/content/ssh-communications-securitys-universal-ssh-key-manager"> more>></a></span></p> http://www.linuxjournal.com/content/ssh-communications-securitys-universal-ssh-key-manager#comments Enterprise Products Security Fri, 03 Mar 2017 17:12:39 +0000 James Gray 1339300 at http://www.linuxjournal.com Secret Agent Man http://www.linuxjournal.com/content/secret-agent-man <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/secret-agent-man" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/hqdefault_4.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="150" /></a> </div> </div> </div> <!--paging_filter--><p> It used to be that only the paranoid among us focused on strict security practices, yet these days, it seems like people are stepping up their games with respect to encryption, password policy and how they approach their computers in general. Although I always have considered myself more inside that paranoid camp than outside of it, I even have found myself stepping up my game lately.<span class="read-more"><a href="/content/secret-agent-man"> more>></a></span></p> http://www.linuxjournal.com/content/secret-agent-man#comments Encryption HOWTOs Security ssh Tue, 28 Feb 2017 13:50:44 +0000 Kyle Rankin 1339297 at http://www.linuxjournal.com Smoothwall Express http://www.linuxjournal.com/content/smoothwall-express <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/smoothwall-express" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12131f6.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="192" /></a> </div> </div> </div> <!--paging_filter--><p> The award-winning <a href="http://smoothwall.org">Smoothwall Express</a> open-source firewall&mdash;designed specifically to be installed and administered by non-experts&mdash;continues its forward development march with a new 3.1 release. <span class="read-more"><a href="/content/smoothwall-express"> more>></a></span></p> http://www.linuxjournal.com/content/smoothwall-express#comments Products Security Fri, 24 Feb 2017 15:28:12 +0000 James Gray 1339294 at http://www.linuxjournal.com Own Your DNS Data http://www.linuxjournal.com/content/own-your-dns-data <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/own-your-dns-data" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/castle-979597_640.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="141" /></a> </div> </div> </div> <!--paging_filter--><p> I honestly think most people simply are unaware of how much personal data they leak on a daily basis as they use their computers. Even if they have some inkling along those lines, I still imagine many think of the data they leak only in terms of individual facts, such as their name or where they ate lunch.<span class="read-more"><a href="/content/own-your-dns-data"> more>></a></span></p> http://www.linuxjournal.com/content/own-your-dns-data#comments HOWTOs Privacy Security Thu, 16 Feb 2017 14:56:30 +0000 Kyle Rankin 1339286 at http://www.linuxjournal.com Simple Server Hardening http://www.linuxjournal.com/content/simple-server-hardening <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/simple-server-hardening" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/hqdefault_3.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="150" /></a> </div> </div> </div> <!--paging_filter--><p> These days, it's more important than ever to tighten up the security on your servers, yet if you were to look at several official hardening guides, they read as though they were written for Red Hat from 2005. That's because they <em>were</em> written for Red Hat in 2005 and updated here and there through the years.<span class="read-more"><a href="/content/simple-server-hardening"> more>></a></span></p> http://www.linuxjournal.com/content/simple-server-hardening#comments HOWTOs Security Servers SysAdmin Tue, 14 Feb 2017 13:12:56 +0000 Kyle Rankin 1339284 at http://www.linuxjournal.com Understanding Firewalld in Multi-Zone Configurations http://www.linuxjournal.com/content/understanding-firewalld-multi-zone-configurations <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/understanding-firewalld-multi-zone-configurations" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/firewall-29503_640.png" alt="" title="" class="imagecache imagecache-node-page" width="200" height="197" /></a> </div> </div> </div> <!--paging_filter--><p> Stories of compromised servers and data theft fill today's news. It isn't difficult for someone who has read an informative blog post to access a system via a misconfigured service, take advantage of a recently exposed vulnerability or gain control using a stolen password.<span class="read-more"><a href="/content/understanding-firewalld-multi-zone-configurations"> more>></a></span></p> http://www.linuxjournal.com/content/understanding-firewalld-multi-zone-configurations#comments Firewalls HOWTOs Networking Security SysAdmin Thu, 02 Feb 2017 12:27:17 +0000 Nathan Vance 1339272 at http://www.linuxjournal.com