- Powerful Firewall Manager built on top of Iptables - Vuurmuur

Vuurmuur is a powerful firewall manager built on top of iptables that works with Linux kernels 2.4 and 2.6.  It has a simple and easy to learn configuration that allows both simple and complex configurations.

The configuration can be fully configured through an Ncurses GUI, which allows secure remote administration through SSH or on the console.

Vuurmuur has powerful monitoring features, which allow the administrator to look at the logs, connections and bandwidth usage in realtime. It makes use of IPTrafficVolume for keeping track of the traffic volume per interface.

The program is divided into three part. One element (the middle-end) converts humanly-readable rules, hosts, groups, networks, zones, interfaces and services into a iptables ruleset (or optional into a bash-script). The second element is a small daemon that converts the Netfilter logs to easy readable logs. The final element is an Ncurses-based user interface (the front-end) to manage the firewall.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/09/135781677519049.html

- Open Source Antispyware Tool - Nixory

Nixory is a free and open source antispyware tool written in Python/PyGTK aimed at removing malicious tracking cookies from your browser. It currently supports Mozilla Firefox, Internet Explorer and Google Chrome. It runs on all OS, including Windows, Linux and MacOSX.

A cookie, in the internet terminology, is a piece of text which your browser stores on your computer when requested by a website you are visiting. Cookies can be used in different useful ways: for authentication, for storing site preferences, for shopping cart contents, but can be also used by companies in less useful places. For example, they can use cookies to track your computer data and IP address for marketing purposes, putting your privacy at risk.

Nixory will protect your browser from this kind of malicious tracking cookies.

Nixory Features include:
 * Ice Eye heuristic system
 * Update stats for number of scans, removed objects and more
 * Customizable options
 * Remove Tool for found data miner
 * Enable to ignore selected data miner groups
 * Enable to write a Scan Log with accurate details
 * Multi-Language support (English, Italian, Dutch, Spanish, Spanish(AR), Catalan)
 * Multi-profiles of Firefox support
 * Flexible management of memory

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/09/135781677518941.html

- How to Prevent Package from Getting Upgraded - Ubuntu Linux

Synaptic is a graphical package management program for Debian based Linux distributions. It provides the same features as the apt-get command line utility with a GUI front-end based on Gtk+. The Synaptic package manager enables the user to install, to upgrade or to remove software packages. To install a package a user must search for the package they want and mark it for installation. Changes are not applied instantly; the user must first mark all changes and then apply them.

There are times where you don not want a particular package from getting upgraded, follow the steps below to prevent any package in your Ubuntu system  from getting upgraded using Synaptic package manager with few clicks.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/09/13578167758811.html

- Anonymous web surfing using TOR - Ubuntu Linux

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.

Installing Tor under Ubuntu:
Add the following repositories to your /etc/apt/sources.list file
deb http://deb.torproject.org/torproject.org natty main
Continue Reading...


source:http://linuxpoison.blogspot.com/2011/09/13578167754587.html

- GUI Toolkit for Database Developers and Administrator - TOra

TOra is an open-source multi-platform database management GUI that supports accessing most of the common database platforms in use, including Oracle, MySQL, and Postgres, as well as limited support for any target that can be accessed through Qt's ODBC support. TOra has been built for various Linux distributions, Mac OS X, MS Windows, and UNIX platforms.

In addition to regular query and data browsing functionality, it includes several additional tools useful for database administrators and developers – which aims to help the DBA or developer of database application. Features PL/SQL debugger, SQL worksheet with syntax highlighting, DB browser and a comprehensive set of DBA tools.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/09/13578167757470.html

- Limiting Linux System Users - limits.conf

Almost all Linux distributions ship with PAM support making it universally available. PAM limits provide a single standardized interface to setting user limits, instead of having to write complex shell configuration files (such as /etc/profile) you simply edit the "limits.conf" file. As well applying limits selectively through the command shell is very difficult, whereas with PAM applying limits globally, on groups or on individual users is quite simple. To enable PAM limits you need to add a line such as:
session        required    /lib/security/pam_limits.so
to the appropriate Pam configuration file (/etc/pam.d/sshd). You can then define limits, typically these are in "/etc/security/limits.conf" or a similar location. Because most of these limits are enforced by the shell the system cannot log all violations of limits (you will be notified in syslog when a user exceeds the number of times they are allowed to login, however you will not receive a warning if the user tries to use more disk space then they are allowed to).
Continue Reading...


source:http://linuxpoison.blogspot.com/2011/09/13578167751278.html

- Securing Service using TCP_WRAPPERS

Using TCP_WRAPPERS makes securing your servers against outside intrusion is a lot simpler and painless. TCP_WRAPPERS is controlled from two files:
/etc/hosts.allow
/etc/hosts.deny
hosts.allow is checked first, and the rules are checked from first to last. If it finds a rule that explicitly allows you in (i.e., a rule allowing your host, domain, subnet mask, etc.) it lets you connect to the service. If it fails to find any rules that pertain to you in hosts.allow, it then goes to check hosts.deny for a rule denying you entry.
Continue Reading...


source:http://linuxpoison.blogspot.com/2011/09/13578167754165.html

- Create and Manage Encrypted Folder (EncFS) in Ubuntu with Cryptkeeper

EncFS creates a virtual encrypted filesystem which stores encrypted data in the rootdir directory and makes the unencrypted data visible at the mountPoint directory. The user must supply a password which is used to (indirectly) encrypt both filenames and file contents.

If EncFS is unable to find a supported filesystem at the specified rootdir, then the user will be asked if they wish to create a new encrypted filesystem at the specified location. Options will be presented to the user allowing some control over the algorithms to use. As EncFS matures, there may be an increasing number of choices.

EncFS offers several advantages over other disk encryption software simply because each file is stored individually as an encrypted file somewhere else in the host's directory tree.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/07/135781677512216.html

- Hack Into Wi-Fi (WEP and WPA Encrypted) Networks - Wifite

Author is NOT responsible for any damage or illegal actions caused by the use of this program. 
Use on your own risk!

Wifite is made to attack multiple WEP and WPA encrypted networks at the same time. this tool is customizable to be automated with only a few arguments. wifite can be trusted to run without supervision. 
 

Wifite features:
 * Sorts targets by power (in dB); cracks closest access points first
 * Automatically deauths clients of hidden networks to decloak SSIDs
 * Numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc)
 * Customizable settings (timeouts, packets/sec, channel, change mac address, ignore fake-auth, etc)
 * "anonymous" feature; changes MAC to a random address before attacking, then changes back when attacks are complete
 * all WPA handshakes are backed up to wifite.py's current directory
 * Smart WPA deauthentication -- cycles between all clients and broadcast deauths
 * Stop any attack with Ctrl+C -- options: continue, move onto next target, skip to cracking, or exit
 * Switching WEP attack methods does not reset IVs
 * Intel 4965 chipset fake-authentication support; uses wpa_supplicant workaround
 * SKA support (untested)
 * Displays session summary at exit; shows any cracked keys
 * All passwords saved to log.txt
 * built-in updater: ./wifite.py -upgrade 


Continue Reading...


source:http://linuxpoison.blogspot.com/2011/09/13578167752413.html

- Tool to Audit Web Application Security - Lilith

LiLith is a tool written in Perl to audit web applications. This tool analyses webpages and looks for html <form> tags , which often refer to dynamic pages that might be subject to SQL injection or other flaws.

How the entire "scanning" process works is different from so called "CGI scanners", such as nikto and n-stealth.  This program will surf to a website and crawls through all the links, just as a user would to.  On any possible input field, such as text boxes, page id's, ... LiLith will attempt to inject any  characters  that might have a special meaning for any underlying technology, such as SQL. 

Any Web applications scanner can never perform a full 100% correct audit. Therefore, a manual re-check is necessary. Hence, be aware that Lilith might come up with several false positives.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/09/135781677512481.html

- Setting up SSH keys for Secure Password-less SSH Login

OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions.

The OpenSSH suite replaces rlogin and telnet with the ssh program, rcp with scp, and ftp with sftp. Also included is sshd (the server side of the package), and the other utilities like ssh-add, ssh-agent, ssh-keysign, ssh-keyscan, ssh-keygen and sftp-server.

If you manage more than one or two hosts, you likely have to type the same password too often. This can get quite annoying. SSH allows you to setup a public and private keypair. Using these keys, you can connect to any host which has the public key, from any host which has the private key.

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/10/135781677514025.html

- Graphical grub2 Configuration Manager - Grub Customizer

The goal of Grub Customizer is to create a complete and intuitive graphical grub2/burg configuration interface. The main feature is the boot entry list configuration - but not simply by modified the grub.cfg: to keep the dynamical configuration, this application will only edit the script order and generate proxies (script output filter), if required. To get more information about how it works, look here: https://answers.launchpad.net/grub-customizer/+faq/1355.
Version 2.0 introduces the ability to change the grub2/burg setting like the default entry, timeouts, menu visibility, screen resolution, background image and colors (grub2 only) and much more.

Since version 1.5 you can use it to repair and configure grub2/burg using a live cd (and Grub Customizer, which has to be installed as usual at the live system before using it). All the required partitions will be automatically mounted when choosing the root partition and some sub partitions on the "partition chooser" (a dialog which pops up, when you start Grub Customizer inside a live system).

Continue Reading...


source:http://linuxpoison.blogspot.com/2011/09/13578167755105.html

- Generate and/or Encrypt Passwords - makepasswd

makepasswd generates true random passwords by  using  the  /dev/urandom feature  of Linux, with the emphasis on security over pronounceability. It can also encrypt plaintext passwords given on the command line.

makepasswd Installation:
Open the terminal and type following command to install makepasswd:
sudo apt-get install makepasswd
After successful installation you can use the makepasswd using following command, here I am generating 10 diffferent passwd having character length 10


For more detail options type command makepasswd --help or check the man pages





source:http://linuxpoison.blogspot.com/2011/10/135781677519506.html

Labels

Web Search Gmail Google Docs Mobile YouTube Google Maps Google Chrome User interface Tips iGoogle Social Google Reader Traffic Making Devices cpp programming Ads Image Search Google Calendar tips dan trik Google Video Google Translate web programming Picasa Web Albums Blogger Google News Google Earth Yahoo Android Google Talk Google Plus Greasemonkey Security software download info Firefox extensions Google Toolbar Software OneBox Google Apps Google Suggest SEO Traffic tips Book Search API Acquisitions InOut Visualization Web Design Method for Getting Ultimate Traffic Webmasters Google Desktop How to Blogging Music Nostalgia orkut Google Chrome OS Google Contacts Google Notebook SQL programming Google Local Make Money Windows Live GDrive Google Gears April Fools Day Google Analytics Google Co-op visual basic Knowledge java programming Google Checkout Google Instant Google Bookmarks Google Phone Google Trends Web History mp3 download Easter Egg Google Profiles Blog Search Google Buzz Google Services Site Map for Ur Site game download games trick Google Pack Spam cerita hidup Picasa Product's Marketing Universal Search FeedBurner Google Groups Month in review Twitter Traffic AJAX Search Google Dictionary Google Sites Google Update Page Creator Game Google Finance Google Goggles Google Music file download Annoyances Froogle Google Base Google Latitude Google Voice Google Wave Google Health Google Scholar PlusBox SearchMash teknologi unik video download windows Facebook Traffic Social Media Marketing Yahoo Pipes Google Play Google Promos Google TV SketchUp WEB Domain WWW World Wide Service chord Improve Adsence Earning jurnalistik sistem operasi AdWords Traffic App Designing Tips and Tricks WEB Hosting linux How to Get Hosting Linux Kernel WEB Errors Writing Content award business communication ubuntu unik