May 13, 2008 · Networking, Security · 29 comments

Tor is a software project that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

Continue reading →

April 23, 2008 · Security · 25 comments

The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc.

Continue reading →

March 25, 2008 · Security · (No comments)

This is a simple "encryption" tool to work with common simple encryption algorithms (ROT13, Caesar, Vigenère, ...) Gcipher does not provide any strong encryption and should not be used to encrypt any private data.Gcipher can run as either a GUI, a command-line application, or a network proxy.

Continue reading →

March 6, 2008 · Security · 10 comments

This tutorial is for people who have encrypted their main volumes of their hard drives using the method offered by the Alternate CD installer.

Continue reading →

March 1, 2008 · Security · 5 comments

scponly is an alternative ‘shell' (of sorts) for system administrators who would like to provide access to remote users to both read and write local files without providing any remote execution privileges. Functionally, it is best described as a wrapper to the tried and true ssh suite of applications.

Continue reading →