public marks

PUBLIC MARKS from lecyborg with tags security & documentation

January 2008

Integrating amavisd-new Into Postfix For Spam- And Virus-Scanning

by 1 other
This article shows how to integrate amavisd-new into a Postfix mail server for spam- and virus-scanning. amavisd-new is a high-performance interface between MTAs such as Postfix and content checkers: virus scanners, and/or SpamAssassin. We will use ClamAV for virus scanning and SpamAssassin for spam scanning in this tutorial. I want to say first that this is not the only way of setting up such a system. There are many ways of achieving this goal but this is the way I take. I do not issue any guarantee that this will work for you!

November 2007

Data Encryption

Gestion du cryptage des données avec Bacula.

Howto crack (or hack) a wireless network with Wired Equivalent Privacy (WEP)

WEP was intended to provide comparable confidentiality to a traditional wired network (in particular it does not protect users of the network from each other), hence the name. Several serious weaknesses were identified by cryptanalysts — any WEP key can be cracked with readily available software in two minutes or less — and WEP was superseded by Wi-Fi Protected Access (WPA) in 2003, and then by the full IEEE 802.11i standard (also known as WPA2) in 2004. Despite the weaknesses, WEP provides a level of security that can deter casual snooping

How to Install Openvpn

The purpose of this document is to describe how to install OpenVPN server on an Ubuntu Linux system and have it utilize an Ethernet bridge to access your local network. Ethernet bridges essentially allow the operating system to treat multiple network interfaces as one combined port. When used with OpenVPN a bridge will allow you to easily connect external users to your internal network and have them receive all traffic as though they were locally connected. The alternative is to use OpenVPN with a route but that will not allow some forms of traffic through (such as multicast), multicast traffic is important to me as many games require multicast data.

October 2007

Firewall et sécurisation d'un réseau personnel sous Linux

by 1 other
Ce document a pour but d'expliquer les rudiments de la sécurité d'une machine Linux placée dans un réseau local (typiquement une maison on un appartement), reliée à Internet. Il est tout particulièrement destiné aux utilisateurs néophytes, ou n'ayant pas ou peu de connaissance sur la sécurité informatique en général, et sous Linux en particulier.

April 2007

January 2007

Squid content filtering

Bloquer et interdire l'accès a certains fichiers avec Squid, le proxy. Ici exemple pour la musique et les vidéos.

Configuring PuTTY

by 1 other
Un bon tutorial sur la configuration du client ssh Putty

Damn Vulnerable Linux

Distribution dédiée à l'apprentissage de la sécurité

Tor: Guide d'installation pour Linux/BSD/Unix

by 1 other
Ces instructions ne s'appliquent qu'à l'installation d'un client Tor

truecrypt

Cryptage de fichiers et de partitions avec Truecrypt

lecyborg's TAGS related to tag security

active directory +   aircrack +   amavis +   anonymat +   apache +   backdoor +   backup +   bacula +   bluetooth +   bufferzone +   cain abel +   clamav +   comparatif +   cryptage +   damn vulnerable +   debian +   dmz +   dns +   documentation +   ebox +   firefox +   firewall +   free +   ftp +   fun +   gnome +   hack +   installation +   ipcop +   iptable +   iptables +   jabber +   kerberos +   linux +   logiciel +   mail +   monitoring +   network +   ntlm +   ofuscation +   openfire +   opensource +   openvpn +   password +   php +   phplogin +   pinholes +   proxy +   putty +   samba +   serveur +   smoothwall +   spam +   squid +   ssh +   ssh-agent +   ssl +   subversion +   test +   tor +   tutorial +   ubuntu +   usb +   utile +   virtualization +   vmware +   vnc +   vpn +   web +   whodad +   wifi +   windows +   xen +   zerina +