Introduction to UNIX-family File Permissions
feb 8,
2017
Learning Tree’s System and Network Security Introduction course begins with a description of the four fundamental concepts of cyber security: authentication, confidentiality, integrity, and availability. That leads into a discussion of authorization: “who is allowed to do what.” The conclusion is the “access equation”: Authentication + Authorization = Access (We also discuss situations where access is […]
Ways to Manage Your SSH Keys and Identities
feb 1,
2017
I wrote a series of blog posts a while ago about SSH authentication using cryptographic keys rather than passwords. I discussed why SSH keys provide easier authentication, how to set up an SSH key agent, and how to maintain multiple websites. There are two areas of security to consider regarding SSH. I think of them […]
authentication,
compliance,
ECC,
Elliptic Curve Cryptography,
HIPAA,
IAM,
Identity and Access Management,
linux,
PCI DSS,
public-key cryptography,
RSA,
Sarbanes-Oxley,
SARBOX,
Security-Enhanced Linux,
SELinux,
SOX,
ssh
How To Add Virus Scanning to Linux
dec 21,
2016
Isn’t Linux virus-free? By the classic meaning of ”virus”, yes. But there is malware for Linux. But Shouldn’t We Worry? What about the more traditional sense of ”virus” we worry about on Windows operating systems? What about the risk posed by hostile data hitting user platforms through e-mail, web, and removable media? To the extent […]
anti-malware,
anti-virus,
Avast!,
AVG,
BitDefender,
Clam Antivirus,
Comodo,
ESET,
F-Secure,
Kaspersky,
McAfee,
open source,
patch management,
root kits,
Sopho,
Symantec,
TrendMicro
Clean Up Your Writing With Linux Utilities
dec 15,
2016
I kept noticing that I frequently make the error of doubling a word in what I write. When I write the source document in HTML or LaTeX, the line breaks are arbitrary. That means that the error may be obvious in the output, but not so obvious in the input. For example, the file I […]
Easily Maintain Multiple Websites with SSH
nov 21,
2016
Over the past two weeks, here, and here, I told you how to set up SSH so your remote access is both more secure and more convenient. Let’s put that to use! The Scenario Let’s say that you maintain a website, and you create and edit pages on both your office desktop computer and your […]