Category Archives: Security

Auto Added by WPeMatico

PSSH – Parallel SSH Tools

Sponsored Link

PSSH provides parallel versions of OpenSSH and related tools. Included are pssh, pscp, prsync, pnuke, and pslurp. The project includes psshlib which can be used within custom applications.PSSH is supported on Python 2.4 and greater (including Python 3.1 and greater).
(…)
Read the rest of PSSH – Parallel SSH Tools (302 words)


© ruchi for Ubuntu Geek, 2015. |
Permalink |
No comment |
Add to
del.icio.us

Post tags: , , ,

Related posts

Bsign – Embed and verify secure hashes and digital signatures

Sponsored Link

The goal purpose of bsign is to verify and authenticate data files,especially executables and other binaries.The program reads all of the options and FILENAMES from the command ine and then begins to operate on the input files. In one invocation in can only one of either hash files, sign files, check hashes, or check signatures.
(…)
Read the rest of Bsign – Embed and verify secure hashes and digital signatures (224 words)


© ruchi for Ubuntu Geek, 2015. |
Permalink |
No comment |
Add to
del.icio.us

Post tags: , , ,

Related posts

sshuttle – A transparent proxy-based VPN using ssh

Sponsored Link

sshuttle allows you to create a VPN connection from your machine to any remote server that you can connect to via ssh, as long as that server has python 2.3 or higher.To work, you must have root access on the local machine, but you can have a normal account on the server.
(…)
Read the rest of sshuttle – A transparent proxy-based VPN using ssh (354 words)


© ruchi for Ubuntu Geek, 2015. |
Permalink |
No comment |
Add to
del.icio.us

Post tags: , , , , ,

Related posts

ssldump – An SSL/TLS network protocol analyzer

Sponsored Link

ssldump is an SSL/TLS network protocol analyzer. It identifies TCP connections on the chosen network interface and attempts to interpret them as SSL/TLS traffic. When it identifies SSL/TLS traffic, it decodes the records and displays them in a textual form to stdout. If provided with the appropriate keying material, it will also decrypt the connections and display the application data traffic.
(…)
Read the rest of ssldump – An SSL/TLS network protocol analyzer (643 words)


© ruchi for Ubuntu Geek, 2015. |
Permalink |
No comment |
Add to
del.icio.us

Post tags: , , ,

Related posts

How To Protect Ubuntu Server Against the GHOST Vulnerability

Sponsored Link

On January 27, 2015, a GNU C Library (glibc) vulnerability, referred to as the GHOST vulnerability, was announced to the general public. In summary, the vulnerability allows remote attackers to take complete control of a system by exploiting a buffer overflow bug in glibc’s GetHOST functions.Check more details from here
(…)
Read the rest of How To Protect Ubuntu Server Against the GHOST Vulnerability (163 words)


© ruchi for Ubuntu Geek, 2015. |
Permalink |
No comment |
Add to
del.icio.us

Post tags: ,

Related posts

Calife – A lightweight alternative to sudo

Sponsored Link

Calife requests user’s own password for becoming login (or root, if no login is provided), and switches to that user and group ID after verifying proper rights to do so. A shell is then executed. If calife is executed by root, no password is requested and a shell with the appropriate user ID is executed.
(…)
Read the rest of Calife – A lightweight alternative to sudo (238 words)


© ruchi for Ubuntu Geek, 2014. |
Permalink |
No comment |
Add to
del.icio.us

Post tags: ,

Related posts

  • No related posts.

Configuring layer-two peer-to-peer VPN using n2n

Sponsored Link

n2n is a layer-two peer-to-peer virtual private network (VPN) which allows users to exploit features typical of P2P applications at network instead of application level. This means that users can gain native IP visibility (e.g. two PCs belonging to the same n2n network can ping each other) and be reachable with the same network IP address regardless of the network where they currently belong. In a nutshell, as OpenVPN moved SSL from application (e.g. used to implement the https protocol) to network protocol, n2n moves P2P from application to network level.
(…)
Read the rest of Configuring layer-two peer-to-peer VPN using n2n (416 words)


© ruchi for Ubuntu Geek, 2014. |
Permalink |
No comment |
Add to
del.icio.us

Post tags: , , ,

Related posts