Security

API Security Hardening

2 min read

This security pass wouldn't have been possible without first cleaning up the pedantic lint issues and expanding test coverage. Auth was optional, password …

Suricata

7 min read

OverviewSuricata is an open source network threat detection engine that can operate as an Intrusion Detection System (IDS), Intrusion Prevention System (IPS), …

SSHd

7 min read

Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. Used primarily on GNU/Linux and …

Squid Guard

4 min read

SquidGuard is a URL rewrite program that works alongside Squid. It takes information about a requested page and checks it against a series of ACLs, blacklists, …

Squid

3 min read

For URL filtering please refer to the SquidGuard page. yum install squid -yAuthentication SetupBefore configuring squid you should get the authentication …

RSyslog

8 min read

RSyslog is a more advanced replacement for the aging klogd and syslogd. It supports useful features such as attribute filtering, multiple protocol support, and …

PAM

4 min read

Overview/etc/pam.d/ directory contains the PAM configuration files for each PAM-aware application. Each pam aware configuration file has lines in the format of: …

Kerberos

3 min read

Kerberos is a secure network authentication system. It is very important that system times are all very close for successful authentication. You should …

Gatekeeper Script for SSH

3 min read

The gatekeeper pattern adds a post-authentication challenge to SSH sessions using ForceCommand. The concept was inspired by a scene in a movie where a system …