July 12, 2010 · Backup, General, Security · 5 comments

Few days ago after I've posted post "How To Reset Forgotten Ubuntu Password", someone ask me (or maybe not ask but give an opinion) about the security of Linux (we all know, "security" is one of the majority feature that Linux offered to us). How about the security if we can reset the root password as easy as that my post said.
After that, I think about that. And I haven't found the answer until now. But, I've got this useful tutorial from Ubuntu Forum. How we can set password protection to our GRUB
Continue reading →

Incoming search terms:

August 18, 2008 · Security · 8 comments

Any user that has physical access to the keyboard can simply use the Ctrl+Alt+Delete key combination to reboot the server without having to log on. Sure, someone could simply unplug the power source, but you should still prevent the use of this key combination on a production server. This forces an attacker to take more drastic measures to reboot the server, and will prevent accidental reboots at the same time.

Continue reading →

Incoming search terms:

May 14, 2008 · Security, Server · 5 comments

A weakness has been discovered in the random number generator used by OpenSSL on Debian and Ubuntu systems. As a result of this weakness, certain encryption keys are much more common than they should be, such that an attacker could guess the key through a brute-force attack given minimal knowledge of the system. This particularly affects the use of encryption keys in OpenSSH, OpenVPN
and SSL certificates.You can check Ubuntu security notice from here

Continue reading →

Incoming search terms:

May 14, 2008 · Security · 7 comments

TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g.., file names, folder names, contents of every file, free space, meta data, etc).

Continue reading →

Incoming search terms:

April 23, 2008 · Security · 24 comments

The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc.

Continue reading →

Incoming search terms: