Security
API Security Hardening
This security pass wouldn't have been possible without first cleaning up the pedantic lint issues and expanding test coverage. Auth was optional, password …
Suricata
OverviewSuricata is an open source network threat detection engine that can operate as an Intrusion Detection System (IDS), Intrusion Prevention System (IPS), …
SSHd
Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. Used primarily on GNU/Linux and …
Squid Guard
SquidGuard is a URL rewrite program that works alongside Squid. It takes information about a requested page and checks it against a series of ACLs, blacklists, …
Squid
For URL filtering please refer to the SquidGuard page. yum install squid -yAuthentication SetupBefore configuring squid you should get the authentication …
RSyslog
RSyslog is a more advanced replacement for the aging klogd and syslogd. It supports useful features such as attribute filtering, multiple protocol support, and …
PAM
Overview/etc/pam.d/ directory contains the PAM configuration files for each PAM-aware application. Each pam aware configuration file has lines in the format of: …
Kerberos
Kerberos is a secure network authentication system. It is very important that system times are all very close for successful authentication. You should …
Gatekeeper Script for SSH
The gatekeeper pattern adds a post-authentication challenge to SSH sessions using ForceCommand. The concept was inspired by a scene in a movie where a system …