Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Friday, 13 February 2015

Cyphertite 2.0.4 is released, available for GNU/Linux (Ubuntu, openSUSE, Fedora), BSD (FreeBSD and OpenBSD), and Microsoft Windows (Windows 8, Windows 7, Vista, XP, Server 2003, and Server 2008)


Cyphertite 2.0.4 released, The most secure, encrypted and powerful tar-like remote archive application for UNIX

Cyphertite is a free, cross-platform and open source command-line application designed to enable users to easily create remote and highly encrypted backups. It can also be used as an encrypted file storage powered by the strongest standards-compliant cryptography available, Cyphertite real privacy and protection, with no questionable security protocols.

Cyphertite 2.0.4 Supported on Linux, BSD, Windows and Mac OS X

Cyphertite is a true cross-platform application, designed to work on numerous operating system, including GNU/Linux (Ubuntu, openSUSE, Fedora), BSD (FreeBSD and OpenBSD), and Microsoft Windows (Windows 8, Windows 7, Vista, XP, Server 2003, and Server 2008). Supported hardware architectures include 32 and 64-bit.

What's new in Cyphertite 2.x.x:
  • The Windows version has a new look and feel.
  • The landing page is broken up into four “live” tiles that update in real-time to provide contextual information to the user.
  • The tiles also provide navigation into the four major areas in the product: Create, Browse, Status, and Settings.
  • This release strives to make each of these areas clear, concise, and linear.
The source is available now. Binary packages are in the process of being built, and will appear soon at their respective download locations.

Monday, 26 January 2015

How to install Tor Browser 4.5a3 on Ubuntu/Linux Mint via PPA


Tor Browser 4.5a3 is based on Firefox ESR 31.4.0, which features important security updates to Firefox. Its updater now contains the code for verifying signed update files and does not accept unsigned ones anymore. Moreover, this release includes an updated Tor, 0.2.6.2-alpha, an updated meek, 0.15, which is now working again, and a bunch of additional improvements and bugfixes.

The third alpha release of the 4.5 series is available from the extended downloads page and also from our distribution directory.
 
Here is the changelog since 4.5-alpha-2:
  • All Platforms
    • Update Firefox to 31.4.0esr
    • Update Tor to 0.2.6.2-alpha
    • Update NoScript to 2.6.9.10
    • Update HTTPS Everywhere to 5.0developement.2
    • Update meek to 0.15
    • Update Torbutton to 1.8.1.3
      • Bug 13998: Handle changes in NoScript 2.6.9.8+
      • Bug 14100: Option to hide NetworkSettings menuitem
      • Bug 13079: Option to skip control port verification
      • Bug 13835: Option to change default Tor Browser homepage
      • Bug 11449: Fix new identity error if NoScript is not enabled
      • Bug 13881: Localize strings for tor circuit display
      • Bug 9387: Incorporate user feedback
      • Bug 13671: Fixup for circuit display if bridges are used
      • Translation updates
    • Update Tor Launcher 0.2.7.1
      • Bug 14122: Hide logo if TOR_HIDE_BROWSER_LOGO set
      • Translation updates
    • Bug 13379: Sign our MAR files
    • Bug 13788: Fix broken meek in 4.5-alpha series
    • Bug 13439: No canvas prompt for content callers

How to install Tor Browser 4.5a3 on Ubuntu/Linux Mint via PPA

To Install/Update Tor Browser 4.5a3 on Ubuntu 15.04 vivid Vervet, ubuntu 14.10 Utopic Unicorn, Ubuntu 14.04 Trusty Tahr (LTS), Linux Mint 17.1 Rebecca, Linux Mint 17 Qiana via PPA, open a new Terminal window and bash (get it?) in the following commands :
sudo add-apt-repository ppa:webupd8team/tor-browser
sudo apt-get update
sudo apt-get install tor-browser

Sunday, 18 January 2015

Suricata 2.0.6 released, Available for Ubuntu, Fedora, OpenSUSE, RHEL, Slackware, Devbian, Linux Mint, Mac OSX, FreeBSD and Windows




Suricata 2.0.6 released, Available for Ubuntu, Fedora, OpenSUSE, RHEL, Slackware, Devbian, Linux Mint, Mac OSX, FreeBSD and Windows

Suricata is a high performance Network IDS, IPS and Network Security Monitoring engine. Open Source and owned by a community run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by the OISF and its supporting vendors.

Suricata is without no doubt the best IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) software ever built, powered only by open source technologies.

What's New in This Release:
  • Bug #1364: evasion issues
  • Bug #1337: output-json: duplicate logging
  • Bug #1325: tls detection leads to tcp stream reassembly sequence gaps (IPS)
  • Bug #1192: Suricata does not compile on OS X/Clang due to redefinition of string functions
  • Bug #1183: pcap: cppcheck warning


1. Highly Scalable

Suricata is multi threaded. This means you can run one instance and it will balance the load of processing across every processor on a sensor Suricata is configured to use. This allows commodity hardware to achieve 10 gigabit speeds on real life traffic without sacrificing ruleset coverage.

2. Protocol Identification

The most common protocols are automatically recognized by Suricata as the stream starts, thus allowing rule writers to write a rule to the protocol, not to the port expected. This makes Suricata a Malware Command and Control Channel hunter like no other. Off port HTTP CnC channels, which normally slide right by most IDS systems, are child’s play for Suricata! Furthermore, thanks to dedicated keywords you can match on protocol fields which range from http URI to a SSL certificate identifier.

3. File Identification, MD5 Checksums, and File Extraction

Suricata can identify thousands of file types while crossing your network! Not only can you identify it, but should you decide you want to look at it further you can tag it for extraction and the file will be written to disk with a meta data file describing the capture situation and flow. The file’s MD5 checksum is calculated on the fly, so if you have a list of md5 hashes you want to keep in your network, or want to keep out, Suricata can find it.

Suricata has many more great features, and we hope you give it a run. It’s free, it’s fast, and it’s going to be here long term!

Suricata 2.0.6 released, Available for Ubuntu, Fedora, OpenSUSE, RHEL, Slackware, Devbian, Linux Mint, Mac OSX, FreeBSD and Windows

to installation Suricata 2.0.6 stable on Ubuntu 15.04 vivid Vervet, ubuntu 14.10 Utopic Unicorn, Ubuntu 14.04 Trusty Tahr (LTS), Ubuntu 13.10/13.04/12.04, Linux Mint 17.1 Rebecca, Linux Mint 17 Qiana, Linux Mint 13 Maya, Pinguy OS 14.04, Elementary OS 0.3 Freya, Elementary OS 0.2 Luna, Peppermint Five, Deepin 2014, LXLE 14.04, Linux Lite 2.0, Linux Lite 2.2 and other Ubuntu derivative systems via PPA, open a new Terminal window and bash (get it?) in the following commands:

sudo add-apt-repository ppa:oisf/suricata-stable
sudo apt-get update
Then you can install the latest stable Suricata with:
sudo apt-get install suricata
or for the Suricata package with build in (enabled) debugging!
sudo apt-get install suricata-dbg
To remove Suricata from your system:
sudo apt-get remove suricata
For Other OS and other linux distro you can follow link this bellow :
Home Suricata

Wednesday, 3 December 2014

Tor Browser Bundle 4.0.2 is out, install on Linux Mint 17.1 Rebecca and Ubuntu 15.04 vivid Vervet, ubuntu 14.10 Utopic Unicorn, Ubuntu 14.04 Trusty Tahr (LTS)


Tor Browser Bundle 4.0.2 is out, install on Ubuntu 15.04 vivid Vervet, ubuntu 14.10 Utopic Unicorn, Ubuntu 14.04 Trusty Tahr (LTS), Ubuntu 13.10/13.04/2.04, Linux Mint 17.1 Rebecca, Linux Mint 17 Qiana, Linux Mint 13 Maya, Pinguy OS 14.04, Elementary OS 0.3 Freya, Elementary OS 0.2 Luna, Peppermint Five, Deepin 2014, LXLE 14.04, Linux Lite 2.0, Linux Lite 2.2 and other Ubuntu derivative systems via PPA

The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.

The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained.

What's New in This Release:
  • Update Firefox to 31.3.0esr
  • Update NoScript to 2.6.9.5
  • Update HTTPS Everywhere to 4.0.2
  • Update Torbutton to 1.7.0.2
  • Bug 13019: Synchronize locale spoofing pref with our Firefox patch
  • Bug 13746: Properly link Torbutton UI to thirdparty pref.
  • Bug 13742: Fix domain isolation for content cache and disk-enabled
  • browsing mode
  • Bug 5926: Prevent JS engine locale leaks (by setting the C library
  • locale)
  • Bug 13504: Remove unreliable/unreachable non-public bridges
  • Bug 13435: Remove our custom POODLE fix (fixed by Mozilla in 31.3.0esr)

Features at a glance

It is a portable software, allowing users to use directly from a USB flash drive, running a pre-configured web browser to protect their anonymity. The Tor software is the key component of Tor Browser Bundle, protecting users by bouncing their communications around a distributed network of relays, which are run by volunteers all around the world.

To Install/Update xxx on Ubuntu 15.04 vivid Vervet, ubuntu 14.10 Utopic Unicorn, Ubuntu 14.04 Trusty Tahr (LTS), Ubuntu 13.10/13.04/2.04, Linux Mint 17.1 Rebecca, Linux Mint 17 Qiana, Linux Mint 13 Maya, Pinguy OS 14.04, Elementary OS 0.3 Freya, Elementary OS 0.2 Luna, Peppermint Five, Deepin 2014, LXLE 14.04, Linux Lite 2.0, Linux Lite 2.2 and other Ubuntu derivative systems, open a new Terminal window and bash (get it?) in the following commands:

i386/32-bit Architectures
sudo add-apt-repository ppa:upubuntu-com/tor
sudo apt-get update
sudo apt-get install tor-browser
sudo chown $USER -Rv /usr/bin/tor-browser/

Amd64/64-bit Architectures  
sudo add-apt-repository ppa:upubuntu-com/tor64
sudo apt-get update
sudo apt-get install tor-browser
sudo chown $USER -Rv /usr/bin/tor-browser/
The source is available now (32 & 64 Bit ). Binary packages are in the process of being built, and will appear soon at their respective download locations.

Monday, 3 December 2012

How to diff remote files over ssh

Diff command line utility compares contents of two files (or directories), and shows how they differ line by line. It's straightforward to use diff if both input files are located on local host. But what if input files located on two different hosts? You can actually diff remote files over ssh. Here is how.Read more »

Monday, 26 November 2012

How to enable X11 forwarding using ssh

X11 forwarding is a mechanism that allows graphical interfaces of X11 programs running on a remote Linux server to be displayed on a local client machine. Behind the scene, the X11 output of a remotely running program is authorized to be sent to localhost via an X11 connection between client and a remote server. SSH has an option to securely tunnel such X11 connections, so that X11 forwarding sessions are encrypted and encapsulated. If you would like to set up X11 forwarding over SSH, check out this guideline.Read more »

Monday, 19 November 2012

What are popular packet sniffers on Linux?

A packet sniffer captures live packets from networks, decodes them according to protocol specifications, and optionally takes actions according to the parsed packet contents (e.g., in case of security detection systems). It is a very useful tool to diagnose networks or protect against security attacks over networks. The following are several popular open-source packet sniffers available on Linux.Read more »

Thursday, 15 November 2012

What are available iptables management tools with GUI?

Netfilter is a packet filtering system within the Linux kernel used for intercepting and processing network packets. Iptables is a user-space program that relies on netfilter to implement stateless/stateful packet filtering for network firewalls, and address/port translation for NATs. There are many applications and tools that ease complex iptables management tasks with convenient graphical front-ends. Here are some of those iptables management tools with GUI.Read more »

Tuesday, 13 November 2012

How to force login password prompt in single user mode

Linux provides so-called "single user mode" or "rescue mode" in which a multi-user Linux system boots into a single user with superuser privilege. The single user mode is useful when you need exclusive access to shared system resources, e.g., when conducting maintenance or security audit of root file system, and updating critical system settings such as resetting root passwords.Read more »

Thursday, 4 October 2012

How to enable ssh access on Vyatta router

A fresh installation of Vyatta does not have SSH access enabled by default. Thus, if you would like to SSH to a Vyatta router, you first need to enable SSH service. In order to enable SSH access on Vyatta router, enter the following commands via its console.Read more »

Saturday, 2 June 2012

How to install SSH on Linux

Secure shell (SSH) is a network prototol providing shell services on a remote machine via a secure channel. OpenSSH is an open-source implementation of the SSH protocol, allowing encrypted communication over a network via a suite of software. If you would like to set up SSH on Linux, you can install OpenSSH as follows.Read more »

Friday, 1 June 2012

How to disable SELinux

Security-Enhanced Linux (SELinux) is a set of kernel enhancements and user-space tools to enforce mandatory access control and security policies. When SELinux is enabled on your system, there may be cases where you would like to turn off SELinux temporarily, for example when you are experimenting with Apache or NFS server, and SELinux gets in the way, blocking necessary port access.Read more »

Friday, 25 May 2012

How to install and configure Tinc-VPN on Linux

tinc is an open-source VPN software with a number of powerful features not found in other VPN solutions.  For example, tinc allows peers behind NAT to communicate with one another via VPN directly, not through a third party.  Other features include full IPv6 support and path MTU discovery.Read more »

Wednesday, 25 April 2012

How to enable ssh login without entering password

Assume that you are a user "a" on host A, and wish to ssh to hostB as user "b" without entering its password.  Do the following while logged in as user "a" on hostA.Read more »