(V) - The Security
Sunday, September 19, 2010
Buy Aqua Socks Michigan
- While GNU / Linux is a famous for its security, robustness and absence of virus (although some are), for better or for Unfortunately our favorite operating system often coexist with other systems much more vulnerable to attack by viruses, either on the same computer within a local network or Internet. For this reason there are solutions that we can install antivirus software and run it from Ubuntu.
Scan Windows partition, if for example you download files using p2p programs and then open these files from windows could become infected with virus, a workaround is to scan them from Ubuntu before opening.
Keeping $ HOME partition virus free, although it is unlikely it could be the case downloaded files in Ubuntu that were infected and that this ultimately affects the system through programs such as Wine. To avoid scan everything you download from untrusted sources. Add a filter to the mail server antivirus
- : If our system is Ubuntu mail server or gateway to other Windows workstations can be a good idea to install a resident anti-virus scan and remove any threat before it it comes to computers "sensitive.
ClamAV ClamAV is an antivirus
antivirus you are in the Ubuntu repositories for installation execute:
$ sudo aptitude install clamav ClamTk
After installation GUI
- available from the menu Applications - Accessories - Scanner
- Virus. Its use is very intuitive and allows to scan any folder or file system.
ClamAV scanning a Windows partition
Among its features most notable are the ability to schedule the scan (from menu Advanced
- Planner ), the possibility of working in resident (by installing the clamav-daemon), GUI for Gnome (
KlamAV ClamTk ) and KDE (), option to quarantine files ...
Avast: Avast also has a version for GNU / Linux free for noncommercial use (thou must register on the website by completing the registration form ). Although not in the repositories can download the deb package directly from your web
avast! Linux Edition (DEB package)
Avast scanning $ HOME
Its operation is very intuitive, first of all update the database and once the update finished proceed to scan the selected folders or the entire system (not recommended).
AVG AVG is not in the repositories, but has deb package (you are missing a specific version of 64-bit) that you can download from your own site
avg85flx -r855-a3656.i386.deb . A After downloading the file will install with the command: $ sudo dpkg-i-r855-a3656.i386.deb avg85flx
Virus database version: 271.1.1/3137
Files scanned : 8451(8443)
Infections found : 0(0) PUPs found : 0 Files healed : 0
Warnings reported : 0
Errors reported : 0 Más información ClamAV
AVG Free Antivirus Avast
- Related Articles
Buy Aqua Socks Michigan
(V) - The Security
- While GNU / Linux is a famous for its security, robustness and absence of virus (although some are), for better or for Unfortunately our favorite operating system often coexist with other systems much more vulnerable to attack by viruses, either on the same computer within a local network or Internet. For this reason there are solutions that we can install antivirus software and run it from Ubuntu.
Scan Windows partition, if for example you download files using p2p programs and then open these files from windows could become infected with virus, a workaround is to scan them from Ubuntu before opening.
Keeping $ HOME partition virus free, although it is unlikely it could be the case downloaded files in Ubuntu that were infected and that this ultimately affects the system through programs such as Wine. To avoid scan everything you download from untrusted sources. Add a filter to the mail server antivirus
- : If our system is Ubuntu mail server or gateway to other Windows workstations can be a good idea to install a resident anti-virus scan and remove any threat before it it comes to computers "sensitive.
ClamAV ClamAV is an antivirus
antivirus you are in the Ubuntu repositories for installation execute:
$ sudo aptitude install clamav ClamTk
After installation GUI
- available from the menu Applications - Accessories - Scanner
- Virus. Its use is very intuitive and allows to scan any folder or file system.
ClamAV scanning a Windows partition
Among its features most notable are the ability to schedule the scan (from menu Advanced
- Planner ), the possibility of working in resident (by installing the clamav-daemon), GUI for Gnome (
KlamAV ClamTk ) and KDE (), option to quarantine files ...
Avast: Avast also has a version for GNU / Linux free for noncommercial use (thou must register on the website by completing the registration form ). Although not in the repositories can download the deb package directly from your web
avast! Linux Edition (DEB package)
Avast scanning $ HOME
Its operation is very intuitive, first of all update the database and once the update finished proceed to scan the selected folders or the entire system (not recommended).
AVG AVG is not in the repositories, but has deb package (you are missing a specific version of 64-bit) that you can download from your own site
avg85flx -r855-a3656.i386.deb . A After downloading the file will install with the command: $ sudo dpkg-i-r855-a3656.i386.deb avg85flx
Virus database version: 271.1.1/3137
Files scanned : 8451(8443)
Infections found : 0(0) PUPs found : 0 Files healed : 0
Warnings reported : 0
Errors reported : 0 Más información ClamAV
AVG Free Antivirus Avast
- Related Articles
Sunday, September 12, 2010
How To Unlock Vip Suitecase
antivirus on Ubuntu (IV) - The Fire Safety
After
the summer break we return items to a dedicated security firewall (Or firewall). According , a firewall is: After
".. a device or set of devices configured to permit, restrict, encrypt, decrypt, traffic between different areas on the basis of a set of standards and other criteria. " For what we want we can define the firewall as a set of rules with which to filter and control all network traffic in and out of your computer (or network). The firewall is the main piece in the network security.
The core of GNU / Linux (or kernel) has an integrated firewall so no need to install any specific software to have it. However, communication with the firewall features of the core (via the command iptables
) can be somewhat complicated for non-experts, for this reason there are programs that will facilitate the task of managing the firewall. The core of GNU / Linux (or kernel) has an integrated firewall so no need to install any specific software to have it. However, communication with the firewall features of the core (via the command iptables
For this article I will use the program gufw (you can find at the Center for Software) to manage the firewall, but others such as firestarter
that will be beaten.
Set access policy There are two main policies when configuring the firewall, depending on the type of use that we will give our network connection choose one or the other:
Deny incoming traffic: reject all incoming connections and explicitly allow connections we want (secure method). Recommended for desktop users and small networks.
Allow incoming traffic: accept all connections and establish specific rules for those who want to deny (unsafe method).
From the main screen gufw
( System - Administration - Configuring firewalls ) activate the firewall and select the default restrictive policy for incoming traffic:
- restrictive default policy
- define the rules
Once defined restrictive policy can define the rules that allow those communications need. We add a rule for each service they want to offer. There are many types of connections and many configurations for each, we will see some representative examples, thou must you apply to services and the conditions that you please lay down your firewall. Open
ports for p2p programs, p2p networks (emule, torrent ...) require certain ports open to function properly, by setting a restrictive policy we have "closed" all ports so you can set up rules for opening we need.
This is as simple as
Add - Preconfigured - Allow - Incoming - Program - select the program you want to allow access
- Add .
Add - Preconfigured - Allow - Incoming - Program - select the program you want to allow access
- Add . In the same way we can allow access to programs or services that we deem necessary.
Allow administration remote: it is very common to have to configure computers remotely via different protocols (ssh, vnc ...) for which generally requires open access a given port. This is an "open door" to the world and a potential security hole. To minimize the risks filter these connections permitting only the connection from a specific IP address (the computer that performs remote administration). In this case the process will Add - Advanced - Allow - Incoming - Register - TCP -
select the IP address and port of origin and destination
- Add .
rulebook definition
In this case we have established a rule that allows access to the SSH service (on port 22) from the address 192.168.1.10 (our internal network) to the computer 192.168.1.2 (also Our internal network, so that not allow connections from any other location to the SSH service.) In addition to greater safety, we have activated the connection log.
More Wikipedia: Firewall
rulebook definition
In this case we have established a rule that allows access to the SSH service (on port 22) from the address 192.168.1.10 (our internal network) to the computer 192.168.1.2 (also Our internal network, so that not allow connections from any other location to the SSH service.) In addition to greater safety, we have activated the connection log.
More Wikipedia: Firewall
SoftLibre: Security
- Ubuntu (I) - Introduction
- Ubuntu Security (II) - User and Password Security
Administration firewall gufw
ufw firewall administration
- firestarter firewall administration
How To Unlock Vip Suitecase
antivirus on Ubuntu (IV) - The Fire Safety
After
the summer break we return items to a dedicated security firewall (Or firewall). According , a firewall is: After
".. a device or set of devices configured to permit, restrict, encrypt, decrypt, traffic between different areas on the basis of a set of standards and other criteria. " For what we want we can define the firewall as a set of rules with which to filter and control all network traffic in and out of your computer (or network). The firewall is the main piece in the network security.
The core of GNU / Linux (or kernel) has an integrated firewall so no need to install any specific software to have it. However, communication with the firewall features of the core (via the command iptables
) can be somewhat complicated for non-experts, for this reason there are programs that will facilitate the task of managing the firewall. The core of GNU / Linux (or kernel) has an integrated firewall so no need to install any specific software to have it. However, communication with the firewall features of the core (via the command iptables
For this article I will use the program gufw (you can find at the Center for Software) to manage the firewall, but others such as firestarter
that will be beaten.
Set access policy There are two main policies when configuring the firewall, depending on the type of use that we will give our network connection choose one or the other:
Deny incoming traffic: reject all incoming connections and explicitly allow connections we want (secure method). Recommended for desktop users and small networks.
Allow incoming traffic: accept all connections and establish specific rules for those who want to deny (unsafe method).
From the main screen gufw
( System - Administration - Configuring firewalls ) activate the firewall and select the default restrictive policy for incoming traffic:
- restrictive default policy
- define the rules
Once defined restrictive policy can define the rules that allow those communications need. We add a rule for each service they want to offer. There are many types of connections and many configurations for each, we will see some representative examples, thou must you apply to services and the conditions that you please lay down your firewall. Open
ports for p2p programs, p2p networks (emule, torrent ...) require certain ports open to function properly, by setting a restrictive policy we have "closed" all ports so you can set up rules for opening we need.
This is as simple as
Add - Preconfigured - Allow - Incoming - Program - select the program you want to allow access
- Add .
Add - Preconfigured - Allow - Incoming - Program - select the program you want to allow access
- Add . In the same way we can allow access to programs or services that we deem necessary.
Allow administration remote: it is very common to have to configure computers remotely via different protocols (ssh, vnc ...) for which generally requires open access a given port. This is an "open door" to the world and a potential security hole. To minimize the risks filter these connections permitting only the connection from a specific IP address (the computer that performs remote administration). In this case the process will Add - Advanced - Allow - Incoming - Register - TCP -
select the IP address and port of origin and destination
- Add .
rulebook definition
In this case we have established a rule that allows access to the SSH service (on port 22) from the address 192.168.1.10 (our internal network) to the computer 192.168.1.2 (also Our internal network, so that not allow connections from any other location to the SSH service.) In addition to greater safety, we have activated the connection log.
More Wikipedia: Firewall
rulebook definition
In this case we have established a rule that allows access to the SSH service (on port 22) from the address 192.168.1.10 (our internal network) to the computer 192.168.1.2 (also Our internal network, so that not allow connections from any other location to the SSH service.) In addition to greater safety, we have activated the connection log.
More Wikipedia: Firewall
SoftLibre: Security
- Ubuntu (I) - Introduction
- Ubuntu Security (II) - User and Password Security
Administration firewall gufw
ufw firewall administration
- firestarter firewall administration
Subscribe to:
Comments (Atom)