Showing posts with label open source. Show all posts
Showing posts with label open source. Show all posts

Wednesday, January 29, 2014

LDAP Issue

Problems:

Creating initial slapd configuration... Loading the initial configuration from the ldif file (/usr/share/slapd/slapd.init.ldif) failed with the following
error while running slapadd:
ldif_read_record: include file:///etc/ldap/schema/core.ldif failed


Solve:

  1. sudo apt-get purge slapd

  2. sudo apt-get install slapd ldap-utils

Thursday, January 6, 2011

web2host + dotproject issue

1. CGI mode is likely to have problems
Resolve:
This was a "uppercase problem".

In installinstallcheck.php on line 46
change
if (php_sapi_name() == 'cgi') {
to
if (php_sapi_name() == 'CGI') {

2.  LDAP Support : Not available


  • Nope, LDAP is not required.

  • The install script checks to see if extension=php_ldap.so is part of you php.ini allowed extensions.

  • If it is, you will be able to use LDAP to authenticate.

  • If it is commented out you will not be able to use LDAP.


Friday, January 23, 2009

100 Best Open Source Security Tools

These tools offer a variety of useful security functions.



  1. Untangle: Untangle will provide you with spam, virus, and spyware protection, as well as Web filtering, firewall, and more.

  2. Network Security Toolkit: This tool combines a variety of open source apps that will help you stay on top of traffic, intrusions, and more.

  3. Bastille Linux: With this tool, you’ll answer questions about your security, and will get a custom lockdown for your machine.

  4. OSSIM: OSSIM brings together a number of open source security tools to give you network details and stay on top of intrusions.

  5. ProShield: Use Proshield to get a scan of your system for up to date software and malware.

  6. Hardened Linux: This Linux distribution will help you improve your security.

  7. eBox Platform: Use this network management framework for content filtering, proxy, firewalls, and more.sa

  8. Kismet: Kismet offers wireless network detection, intrusion detection, and packet sniffing, all in one.


Monitoring


With these tools, you’ll get constant monitoring of your security.

  1. Nessus: Use this free scanner to stay on top of your vulnerabilities.

  2. Nagios: This host and network monitoring tool will let administrators handle outages before clients and users are affected.

  3. AWStats: Use AWStats to get a look at attacks on your server.

  4. Honeytrap: With this tool, you’ll get advanced warning about attacks.

  5. The Multi Router Traffic Grapher: Use this tool to monitor your SNMP network devices.

  6. Snort: Snort is an incredibly effective intrusion detection system.

  7. BASE: This tool works well with Snort to make your intrusion detection data more easy to understand.

  8. Internet Secure Access Kit: This suite will help you restrict and monitor access on your network.

  9. Afick: Afick will help you stay on top of changes to your system.

  10. Network Security Analysis Tool: Use this tool to scan your network for vulnerabilities.

  11. Nagios: This program will monitor your enterprise network services, environmental factors, host resources, and point out potential vulnerabilities.

  12. JbroFuzz: With this tool, you can test the integrity of your network.

  13. Yet Another Security Monitoring Interface: This web based application will help you take a look at the data flow in your router.

  14. ettercap: Ettercap will monitor your LAN, staying on top of content, live connections, and other potential attacks.

  15. Metasploit: Often used by hackers, you can test your system with this tool.

  16. SNARE: Make use of this tool that collects and analyzes your event log data.

  17. Nikto: Nikto will scan your web servers for problems and dangerous files.


Email & Spam


Use these tools to keep your email secure.

  1. Spam Assassin: This anti-spam tool will help you keep your email neat and clean.

  2. Tiger Envelopes: This email encryption tool works with a variety of programs, including Thunderbird and Outlook.

  3. Anti-Spam SMTP Proxy Server: Use this application to filter out spam and viruses.

  4. Spamato: With this client-side spam filter, you can keep the junk out of your Outlook, Thunderbird, and other popular email clients.

  5. phPOP3clean: Use this scanner to look for worms, spam, blacklisted words, as well as blacklisted domains.

  6. Thunderbird: This open source email program has a variety of tools for keeping spam and viruses at bay.

  7. Mailsaurus: This email client will encrypt all of your data so that no one can read your email.

  8. MailCleaner: With this filtering application, you can keep the spam and viruses out.

  9. Web Stat: Want to know how much spam you’re blocking? Use this tool that will display your level of blocked spam graphically.


Anti-Virus


With these tools, you can protect your computer and network from viruses.

  1. FullControl: This software will stay on top of all the programs running on your computer and verify their integrity.

  2. ClamAV: Make use of this excellent antivirus tool to keep your machine free of viruses.

  3. ClamWin: If you want to take advantage of ClamAV on your Windows machine, make use of this tool.

  4. Moon Secure Antivirus: This antivirus scanner also features a firewall.

  5. Winpooch Watchdog: Winpooch will stay on top of spyware, trojans, and viruses.

  6. Softlabs AntiVirus: Using this antivirus tool, you can scan your email for phishing and viruses.


Firewall


Use these firewall tools to keep unwanted intruders and items out of your system.

  1. SELinux: Using SELinux, you can set mandatory access control features for Linux.

  2. m0n0Wall: This tool offers both firewall and VPN.

  3. ShellTer: ShellTer offers a firewall with SSH protection.

  4. Endian Firewall Community: Use this tool to turn an old PC into an appliance that provides a variety of security functions.

  5. FirewallPAPI: This system will stay on top of your network traffic.

  6. SmoothWall Express: Use SmoothWall to turn a PC into a firewall appliance for your network.

  7. WIPFW: Use this tool to monitor and filter packets entering your network.

  8. Fail2Ban: Fail2Ban will stay on top of log files and look for failure prone IPs, which will be blacklisted.

  9. Vyatta: Turn to Vyatta to get an enterprise class firewall for free.

  10. ISP-FW: With this server side firewall application, you can get packet filtering and monitoring.

  11. Firewall Builder: This tool will make it easy to establish rules for your firewall.

  12. AppArmor: Create policy-based profiles to control access to applications with AppArmor.

  13. Firestarter: Make use of this firewall if you want to get your firewall security up and running in a hurry.

  14. Linux Embedded Appliance Firewall: This firewall tool will help you shore up your security.

  15. IPCop: With this tool, you can turn any PC into a firewall appliance to get your network secure.


Files & Data


Keep your files, data, and transfers secure with these tools.

  1. Darik’s Boot and Nuke: If you want to wipe out a hard drive, just boot up with a disk containing this tool.

  2. Packet Generator: Use this tool to optimize the routing schematics for your network.

  3. Paros: Paros intercepts data, offering a way to evaluate web application security.

  4. Cyberduck: With this tool, you can transfer files to remote computers and networks.

  5. WinSCP: Use this SFTP and FTP client for secure file transfes.

  6. Eraser: This tool will eliminate files by overwriting them several times, so that they can’t be read using digital forensic tools.


Encryption & Cryptography


Make use of these encryption and cryptography tools to stay secure.

  1. KeyCzar: Use this toolkit to make cryptography easier to use in applications.

  2. Cameloid: Keep your voice connections safe with this encryption tool.

  3. GNU Privacy Guard: This encryption tool uses a number of different encryption algorythms.

  4. TrueCrypt: Use TrueCrypt to encrypt a partition or drive, or create a virtual encrypted disk within a file.

  5. Cryptonit: Secure your files and address books with this encryption tool.

  6. Checkpoint Commander: This tool will both encrypt and completely erase your files.

  7. AxCrypt: AxCrypt is a simple encryption tool that will allow you to encrypt files with just a few clicks.

  8. Magikfs: You can hide your files using this tool with a steganographic filesystem.

  9. FreeOTFE: This tool will create secure virtual drives on your PC.

  10. Cryptology: Cryptology offers encyption that integrates into Windows Explorer right-click menus.


Passwords


With these tools, you can keep your passwords handy and secure.

  1. KeePass: Use this password safe to keep all of your passwords safe and encrypted.

  2. CiphSafe: This tool will encrypt your usernames and passwords for popular Internet websites.

  3. Password Safe: Password Safe will help you create strong passwords and can store multiple password databases.

  4. Keep It Secret! Keep It Safe!: With this tool, you can store your important usernames and passwords in an encrypted file.


Remote Access


Use these tools for secure remote access.

  1. OpenSSH: With this tool, you can safely operate a remote host.

  2. Stunnel: Stunnel will encrypt your TCP connections inside SSL connections.

  3. OpenVPN: Get safe VPN access using this tool.

  4. SSL-Explorer: This web-based VPN server will allow you to use a standard browser.

  5. Open SSL: This tool uses Transport Layer Security and Secure Socets Layer protocols to keep you safe.

  6. strongSwan: strongSwan offers an IPsec-based VPN tool for Linux.

  7. PuTTy: Get remote access with this telnet/SSH client.

  8. UltraVNC: Use this tool to get safe and secure remote access.


Networking


These tools will help you operate a more secure network.

  1. Nmap: Nmap will help you stay informed of all of the hardware that is connected to your network.

  2. Wireshark: Using Wireshark, you can take a look at all of the traffic that passes over your Ethernet network.

  3. Bro: Bro offers network intrusion detection that will passively monitor your network traffic for anomalous traffic behavior.

  4. Network Simulator and Network Animator: With this tool, you can test your network flow to prevent bottlenecks and promote better routing.

  5. OCS Inventory NG: This tool will provide you with a list of hardware and software on your network.

  6. Netcat: Netcat is a simple utility that will help you read and write data across UDP or TCP network connections.

  7. Angry IP Scanner: This tool will scan IP adresses and ports on your network.

  8. Ossec HIDS: With this intrusion detection system, you’ll find out when your network is being attacked.

  9. TcpDump: If you’re looking for a light, secure packet sniffer, check out this tool.

  10. The Network Visualizer: Get graphic information on your network activity using this tool.


Miscellaneous


Check out these tools for even more open source security applications.

  1. Tripwire: Find out when changes are made to your system by using this tool.

  2. Firefox: A very popular web browser, Firefox offers a variety of secure options and add ons.

  3. The Sleuth Kit: With this kit, you can recover deleted files.

  4. JAP: This tool will allow you to browse the Internet anonymously.

  5. iSAK: Using this tool, you can filter out specific types of websites.

  6. Advisory Check: This tool will read RSS and XML security feeds to monitor the security of the software you’re using.

  7. Babel: Babel will let you know about all of the security flaws that you have in your system.

Tuesday, December 23, 2008

Open Source e-Book

Installation and Getting Started

  1. Introduction to Linux - A Hands on Guide

  2. Linux From Scratch

  3. The Easiest Linux Guide You’ll Ever Read - An Introduction to Linux for Windows users

  4. Linux Installation and Getting Started by Matt Welsh

  5. Comprehensive Linux Textbook by Muayyad Saleh Al-Sadi

  6. Pocket Linux Guide

  7. Linux+ Study Guide

  8. The Linux Cookbook: Tips and Techniques for Everyday Use by Michael Stutz

  9. Beyond Linux from Scratch

  10. Brian and Tom’s Linux Book

  11. Everyday Linux

  12. Linux Dictionary

  13. Learning the Unix Operating System

  14. Slackware Linux Essentials by Alan Hicks, Chris Lumens, David Cantrell, and Logan Johnson


Security

  1. Linux Admins Security Guide

  2. Linux Security Howto

  3. Linux Firewall Configuration, Packet Filtering & netfilter/iptables

  4. Securing and Optimizing Linux by Gerhard Mourani


System Administration

  1. The Book of Webmin Or: How I Learned to Stop Worrying and Love UNIX

  2. Linux Network Administrator’s Guide by Olaf Kirch and Terry Dawson

  3. Self-Service Linux: Mastering the Art of Problem Determination by Dan Behman and Mark Wilding

  4. SUSE Linux Administration Guide

  5. Bash Guide for Beginners

  6. In The Beginning Was The Command Line

  7. Vi iMproved (VIM)


Programming

  1. The Art of Unix Programming

  2. Advanced Linux Programming by CodeSourcery LLC

  3. Java Application Development on Linux by Carl Albing and Michael Schwarz(PDF)

  4. Writing GNOME Applications

  5. Advanced Linux Programming

  6. Secure Programming for Linux and Unix

  7. The Art of Unix Programming

  8. The Linux Development Platform

  9. Secure Programming for Linux and Unix HOWTO

  10. C++ GUI Programming With Qt 3

  11. Linux Kernel Module Programming Guide by Ori Pomerantz

  12. KDE 2.0 Development

  13. GTK+/Gnome Application Development

  14. GNU Autoconf, Automake and Libtool

  15. The Linux Kernel Module Programming Guide

  16. PHP Essentials

  17. Javascript Essentials

  18. Visual Basic Essentials


Migration



  1. Linux Client Migration Cookbook

  2. Linux Client Migration Cookbook, Version 2: A Practical Planning and Implementation Guide for Migrating to Desktop Linux by Chris Almond


Kernel



  1. The Linux kernel

  2. Linux Kernel 2.4 Internals


Ubuntu



  1. Unofficial Ubuntu Guide

  2. Ubuntu Linux Essentials


Red Hat



  1. Red Hat Enterprise Linux Installation Guide

  2. Red Hat Enterprise Linux Reference Guide

  3. Red Hat Enterprise Linux Step By Step Guide

  4. Maximum RPM, Taking the Red Hat Package Manager to the Limit


Fedora Core



  1. Red Hat Fedora Core 7 Installation Guide

  2. Fedora Core 7 Desktop Guide

  3. Fedora Linux Essentials


Knoppix



  1. Knowing Knoppix


Debian



  1. Debian GNU/Linux Desktop Survival Guide

  2. Debian GNU/Linux System Administrator’s Manual

  3. Linux Compute Clusters by Chander Kant

  4. Linux Device Drivers, Third Edition

  5. GNU Bash Reference Manual

  6. GNU Emacs manual

Friday, April 6, 2007

10 things you should do to a new Linux PC

Before exposing it to INTERNET. !!!!!


1: Your purpose

Linux, like Microsoft Windows, is simply a computer operating system. When I talk to friends or co-workers who are embarking on the Linux experience for their initial time, this is the first point I stress. Linux in itself is not a magic wand that can be waved and make all sorts of computing problems disappear. While Windows has its own set of problems, so too does Linux. There is no such thing as a perfect or completely secure computer operating system. Will the machine be a desktop computer or a server; purpose is a key to understanding how to initially install and configure your Linux PC.

2: Installation

Unlike Windows, Linux does not present itself as a "server" version or as a "desktop" version. During a typical installation of Linux the choice is yours as to exactly what software you wish to install and therefore exactly what type of a system you are constructing. Because of this, you need to be aware of the packages that the installation program is installing for you. For example, some distributions will configure and start a Samba server or a mail server as part of the base install. Depending upon the purpose of your Linux PC and the security level you are prepared to accept, these services may not be needed or desired at all. Taking the time to familiarize yourself with your distributions' installer can prevent many headaches and/or reinstalls down the road.

Wednesday, December 20, 2006

Rootkit Hunter


Rootkit scanner is scanning tool to ensure you for about 99.9%* you're clean of nasty tools. This tool scans for rootkits, backdoors and local exploits by running tests like:


- MD5 hash compare
- Look for default files used by rootkits
- Wrong file permissions for binaries
- Look for suspected strings in LKM and KLD modules
- Look for hidden files
- Optional scan within plaintext and binary files


Rootkit Hunter is released as GPL licensed project and free for everyone to use.


* No, not really 99.9%.. It's just another security layer


Download here