background preloader

Security

Facebook Twitter

How To Improve Your Privacy and Security By Installing Tor On Your Android Smartphone.

Encryption

Firewall. Centralized File-Integrity With Samhain Part I - The Community's Center for Security. This article will discuss installing and configuring a secure, centralized file-integrity program.

Centralized File-Integrity With Samhain Part I - The Community's Center for Security

Later articles in this series will discuss specific features, like deploying packaged clients to hosts on your network, creating customized reports, and other cool Samhain features. Centralized monitoring is critical today with the large number of servers that are deployed in many organizations. Reading reports from individual servers can be quite cumbersome and time-consuming. Programs are needed that will provide accurate and secure information about the state and health of servers in a timely manner in a centralized location, whether with one server or multiple servers. One of the most critical needs is a program that will alert an administrator when files have been changed on a system whether intentionally or as the result of a security compromise. Helios. Preventing SSH Dictionary Attacks With DenyHosts.

Title. » Protect your network against fiber hacks. Linux-Sec.net. PHENOELIT.