Categories
- Database (7)
- DNS (5)
- Encryption (8)
- Linux Administration (78)
- MacOSX (9)
- Mailserver (11)
- Monitoring (3)
- Multimedia (2)
- Photo (1)
- PHP (7)
- Rescue (4)
- Review (5)
- Security (37)
- Storage (1)
- Uncategorized (1)
- Version control system (16)
- Virtualisation (4)
- Web technologies (8)
- Wordpress (1)
Social Profiles
Facebook
Github
Twitter
Linkedin
Xing
Gravatar
Stackoverflow
Mastodon-
Category Archives: Security
Change SSH port in CentOS with SELinux
Since version 4 of CentOS, SELinux is providing an additional layer of security to the Linux distribution. As of SELinux in combination with sshd, changing the port or even listening on 2 ports is not as easy as just changing the sshd configuration file. Continue reading
Posted in Linux Administration, Security
Tagged CentOS, SELinux, SSH
Comments Off on Change SSH port in CentOS with SELinux
yum – install package that contains a specific file
When i realised that the program to manage the SELinux rules is called “semanage” i tried to find a package of the same name in the yum repositories. But i could not find it. So i had to find it inside the yum repository. I am happy that yum provides an easy way to find a file that is provided within a package. Continue reading
Restrict Linux User to SCP to his home directory
You wanna give access to your server? But you want to restrict access to SCP/SFTP and to the user’s home directory. Here is how i configured an account restricted to SCP/SFTP only using jailkit on CentOS. Continue reading
Subversion via ssh using authorized_keys
When i used subversion in the past i created a separate user on the linux operating system. This user then got the right to login via ssh to use subversion. If you have one or two users to manage that is not a big deal. But when the amount of users is growing … Continue reading
Posted in Linux Administration, Security, Version control system
Tagged authorized-keys, SSH, Subversion, SVN
Comments Off on Subversion via ssh using authorized_keys
SSH remote host identification has changed
You might know the situation when you try to login to a server via ssh and instead of the console you get the “REMOTE HOST IDENTIFICATION HAS CHANGED” Warning. Here is how to deal with it. Continue reading
Posted in Linux Administration, Security
Tagged SSH
Comments Off on SSH remote host identification has changed
SSH passwordless login with SSH-key
Whenever you connect to a server via SSH you have to enter your password. If you have to connect often, it might start to be annoying to entering the password on every attempt to connect to the server. Isn’t there some easier way? Yes there is! I will show here how to set this up. Continue reading
Posted in Linux Administration, Security
Tagged authorized-keys, passwordless login, SSH, ssh key
Comments Off on SSH passwordless login with SSH-key
The NSA and HTTPS facebook privacy
It seems to be a big discussion about US government agencies, like the NSA, accessing user data from Google and Facebook. As of this i got asked how that can be a problem as the HTTPS is secure anyway. I would like to explain here what the difference is between HTTPS and privacy! … Continue reading
Posted in Security
Tagged facebook pricavy, google and nsa, https facebook, the nsa
Comments Off on The NSA and HTTPS facebook privacy