How To Harden My Filesystem - Page 2
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Backing up files is a crucial task that every system administrator should perform. Here's how you can create a backup of your data using Déjà Dup.
See how easy it is to deploy a secure FTP server to your network, with the help of SFTPGo.
Pika Backup, an open-source graphical backup utility created by Sophie Herold, promises to keep your data safe and make the entire process easier than ever.
Learn about special file permissions in Linux to have granular control over file and directory access by users.
GPG is a popular and powerful Linux file encryption tool. Learn how to use GPG to keep private files private.
Learn about seven great tools you can use to encrypt/decrypt and password protect files on Linux in this tutorial.
Learn how to easily and securely encrypt files on Linux in this tutorial.
Learn about Linux file permissions and how they can be changed using the chmod command in this Linuxize tutorial.
Learn how to use fscrypt to create an encrypted filesystem - but be warned: this involves tinkering on the command line and doing a partially or fully manual operating system installation. However, if you are willing to put in the time and effort, you will enjoy a high-performing computing experience with seamless modern encryption protection.
Looking for a user-friendly encryption tool to secure data on your Linux servers? If so, you'll want to check our gocryptfs. In this tutorial, Jack Wallen demonstrates how to install and use gocryptfs.
Looking for a way to create encrypted filesystems on Linux? Cryptmount is a powerful utility that allows any user to access encrypted filesystems on-demand under GNU/Linux systems without requiring root privileges.
Looking to secure your confidential files against unauthorized access? If so, you will want to check out this tutorial on how to password protect files in Vim editor.
Want to learn how to encrypt or sign files using GNU Privacy Guard? Check out this helpful tutorial.
Learn to easily secure multiple documents by encrypting compressed files on Linux using a password.
Learn how to create backups that can be restored on a filesystem smaller than the original one using Fsarchiver in this helpful tutorial.
Looking to harden your Linux filesystem? Gocryptfs encrypts at the file level, so synchronization operations can work efficiently on each file. Learn more in this informative article:
A bit of a shift towards UNIX for those looking to a get a different view of network scanning: Discover how to scan your network for services and how to regularly monitor your services to keep uptimes to a maximum. A key way of ensuring the security of your network is to know what is on your network and what services individual machines are at risk of exposure. Unauthorized services, such as Web servers or file sharing solutions, not only degrade performance, but others can use these services as routes into your network. In this article, learn how to use these same techniques to ensure that genuine services remain available.
This will show you how to take boot CD's and make them hardened enough for what you need in any VPN application. From the introduction: For several years now, users at the Institution where I currently work part-time have expressed a need for a robust and secure connection to the internal network. The internal network actually has some clients that are on private networks and some clients that are Internet-route-able. Being mostly a Microsoft shop, the options that have been available were not deemed appropriate for various reasons, usually due to security concerns. After being introduced to the problem a few months ago and listening to the concerns surrounding it, I suggested using a boot CD, which would alleviate all of their security concerns. They gave me the go ahead to give it a try. I now have a working prototype and this document describes the process used to create it.
Ubuntu Gutsy-Gibbon on the brain? Looking to set up a solid defense with Intrusion Detection Snort, MySQL and more? HowToForge has a great guide from a contributor, Devilman: In this tutorial I will describe how to install and configure Snort (an intrusion detection system (IDS)) from source, BASE (Basic Analysis and Security Engine), MySQL, and Apache2 on Ubuntu 7.10 (Gutsy Gibbon). Snort will assist you in monitoring your network and alert you about possible threats. Snort will output its log files to a MySQL database which BASE will use to display a graphical interface in a web browser. Read on...
This is a recently found HOWTO, and is an amazing and comprehensive resource for getting many different Linux systems secure. This Linux Security HOWTO is intended for a technical audience, Linux system administrators, and security people in corporations and organizations that have to use commercial Linux distributions for their production environment. Check out the index for a complete listing of what this HOWTos Cover. The description also states it is "A Practical Guide to Basic Linux Security in Production Enterprise Environments" Written by Werner Puschitz