Discover How To Strengthen My Privacy HOWTOs

OS Tool of the Month: Gnu Privacy Guard (GnuPG) Mini Howto


Originall written in 2004, here you will find one of the most extensive HowTo's available for GnuPG. It truly is a 'soup to nuts' overview.

This documents explains how to use the GNU Privacy Guard (GnuPG), an Open Source OpenPGP compatible encryption system. To keep this program totally free the use of the RSA algorithm and other patented algorithm has been avoided. The document was originally written by Michael Fischer v. Mollar in German.

Security with Keystroke Dynamics


Are you always looking to expand your security practices? Do you want to take a crack at instituting a whole new way of creating a secure, password infrastructure? If so, this article on keystroke dynamics can help you break into whole new worlds of security...

Measure the total time of entry and verify the time between keystrokes to help authenticate a user regardless of the data being entered. Require nonprintable characters, such as backspace and break, in the password to enable new levels of password obfuscation. Learn how to apply the open source tools xev and Perl in keystroke dynamics to measure the more-subtle characteristics of human-computer interaction.

The whorls and ridges on your fingertips can identify you based on what you touch. How you touch and especially type can often be just as unique an activity. Keystroke dynamics is a relatively new field that enables identification of individuals through statistical analysis of their typing patterns. Many commercial products analyze the dynamics of password entry, as well as continuous typing monitoring for enhanced security. This article uses example code to demonstrate keystroke dynamics for enhancing the security of your applications in authentication and continuous data entry contexts.

How to: Restrict Users to SCP and SFTP and Block SSH Shell Access with rssh


A quick HowTo on using secure FTP to transfer files. What is sftp?

SCP/SFTP -> SSHD -> Call sftpd subsystem -> Requires a shell -> User can login to server and run other commands.

In this article series we will help you provide secure restricted file-transfer services to your users without resorting to FTP. It also covers chroot jail setup instructions to lock down users to their own home directories (allow users to transfer files but not browse the entire Linux / UNIX file system of the server) as well as per user configurations.