June 4, 2010 · Security · 7 comments

The Linux Security Auditing Tool (LSAT) is a post install security auditor for Linux/Unix. It checks many system configurations and local network settings on the system for common security/config errors and for packages that are not needed.
Continue reading →

Incoming search terms:

May 27, 2010 · Security · 1 comment

AppArmor is a security tool and uses name-based mandatory access controls to restrict or confine system access by "at risk" applications. "At risk" applications generally include both server and client applications with network access. In this post I will use Firefox as an example.
Continue reading →

Incoming search terms:

May 18, 2010 · Security, Server · (No comments)

Nmap is a utility for network exploration or security auditing. It supports ping scanning (determine which hosts are up), many port scanning techniques, version detection (determine service protocols and application versions listening behind ports), and TCP/IP fingerprinting (remote host OS or device identification). Nmap also offers flexible target and port specification, decoy/stealth scanning, sunRPC scanning, and more. Most Unix and Windows platforms are supported in both GUI and commandline modes. Several popular handheld devices are also supported, including the Sharp Zaurus and the iPAQ.
Continue reading →

Incoming search terms:

April 17, 2010 · Security · 4 comments

Ninja is a privilege escalation detection  and  prevention system for GNU/Linux hosts. While running, it will monitor process activity on the local host, and keep track of  all processes  running  as root.  If a process is spawned with UID or GID zero (root), ninja will log necessary  informa-tion  about  this process, and optionally kill the process if it was spawned by an unauthorized user.
Continue reading →

Incoming search terms:

March 31, 2010 · Security, Server · 11 comments

Buck-Security is a security scanner for Debian and Ubuntu Linux. It helps you to harden your system by running some important security checks. For example, it finds world-writable files and directories, setuid and setgid programs, superuser accounts, and installed attack tool packages. It also checks your umask and checks if the sticky bit is set for /tmp, among other checks.It was designed for Debian and Ubuntu servers, but can be useful for any Linux system.
Continue reading →

Incoming search terms: