linux poison RSS
linux poison Email
0

Convert your videos quickly, easily, and all at once with WinFF and FFmpeg

Convert your videos quickly, easily, and all at once with WinFF and FFmpeg
WinFF is a GUI for the command line video converter, FFMPEG. It will convert most any video file that FFmpeg will convert. WinFF does multiple files in multiple formats at one time. You can for example convert mpeg's, flv's, and mov's, all into avi's all at once. WinFF is available for Windows 95, 98 , ME, NT, XP, VISTA, and Debian, Ubuntu, Redhat based GNU/Linux distributions.


Read more
0

How much do you really know about the GPL?

So your a developer of free software. Now you want to license your code under the GPL. How much do you really know about the GPL?

Take the Free Software License Quiz and find out how much you know (or don’t know) about the GPL and/or LGPL.

This quiz is a very short cgi written in Perl (source available) that tests basic knowledge about the Definition of Free Software, the GPL and the LGPL.

One may wish to review the GPL FAQ before taking the quiz.

Take the quiz and post your results as a comment. You may be surprised.


Read more
1

SmoothWall, the firewall for home users

SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Linux is the ideal choice for security systems; it is well proven, secure, highly configurable and freely available as open source code. SmoothWall includes a hardened subset of the GNU/Linux operating system, so there is no separate OS to install. Designed for ease of use, SmoothWall is configured via a web-based GUI, and requires absolutely no knowledge of Linux to install or use.

SmoothWall Express turns a PC into a dedicated hardware firewall, which sits between your private network and the Internet. It does not allow any unauthorised data to pass through the firewall. There are no services offered to the Internet and SmoothWall Express will not respond to the network messages that hackers use to identify potential targets. It is therefore quite simply invisible to the legions of script kiddies, hackers and crackers looking for an interesting firewall to attack.

Key features

If using analog MODEM, ISDN, USB ADSL, Ethernet connection to the Internet
* network address translation, hide your computer IP address

Stateful packet inspection

* IP address tracking – trace those hackers using the in-build ‘Who is’ feature
* IP address blocking – create your own IP address block list
* Intrusion detection – find out who is ‘probing’ your network
* Comprehensive logging features – all events are logged for evidence
* Monitor network load graphically

No monitor; keyboard or mouse required

* Does not slow down the network or the broadband connection
* Remote access and remote shut down feature

DHCP Server , HTTP Proxy Server
Dynamic DNS
Virtual Private Networking (VPN)
Configuration backup and Secure Shell

Download Smoothwall Express here.

Read more
0

An authenticating firewall

An authenticating firewall
NuFW lays on Netfilter, the state of the art IP filtering layer from the Linux kernel. It fully integrates with Netfilter and extends its capabilities. The daemons currently run on Linux and software clients are available for Windows, Linux, FreeBSD et Mac OSX.
Its exclusive algorithm allows authenticated filtering even on multiuser computers.

NuFW can be seen as an Identity access management solution, at the network level.

NuFW can :
* Authenticate any connection that goes through your gateway or only from/to a chosen subset or a specific protocol (iptables is used to select the connections to authenticate).
* Perform accounting, routing and quality of service based on users and not simply on IPs.
* Filter packets with criterium such as application and OS used by distant users.
* Log all traffic in SQL with username and application information
* Be the key of a secure and simple Single Sign On system.

Download: Here
Read more
0

Protect SSH from brute force attacks

pam_abl provides auto blacklisting of hosts and users responsible for repeated failed authentication attempts. Generally configured so that blacklisted users still see normal login prompts but are guaranteed to fail to authenticate.

Brute force password discovery attacks involve repeated attempts to authenticate against a service using a dictionary of common passwords. While it is desirable to enforce strong passwords for users this is not always possible and in cases where a weak password has been used brute force attacks can be effective.

The pam_abl module monitors failed authentication attempts and automatically blacklists those hosts (and accounts) that are responsible for large numbers of failed attempts. Once a host is blacklisted it is guaranteed to fail authentication even if the correct credentials are provided.

Blacklisting is triggered when the number of failed authentication attempts in a particular period of time exceeds a predefined limit. Hosts which stop attempting to authenticate will, after a period of time, be un-blacklisted.

Download: Here

Installation:

$ make install
$ cp conf/pam_abl.conf /etc/security

Edit your PAM configuration to include the pam_abl.so module. Here's an example

auth required /lib/security/pam_env.so
auth required /lib/security/pam_abl.so config=/etc/security/pam_abl.conf
auth sufficient /lib/security/pam_unix.so likeauth nullok
auth required /lib/security/pam_deny.so



Read more
Related Posts with Thumbnails