Configure Ubuntu 16.04 to use two-factor authentication
When a ssh-key authentication is not enough, the quickest solution for a server could be to make ssh to ask for 2-factor token when logging in.
When a ssh-key authentication is not enough, the quickest solution for a server could be to make ssh to ask for 2-factor token when logging in.
An update to rkhunter will fail with Invalid WEB_CMD configuration option: Relative pathname: "/bin/false"
This article provides a quick reference to UFW commands that will create iptables firewall rules are useful in common, everyday scenarios.
AIDE provides an additional layer to your server security not by keeping intruders out but by notifying you as the sysadmin of a possible intrusion.
To configure the Solaris Auditing subsystem on Solaris 9 or Solaris 10 we simply run the bsmconv command-line utility from the /etc/security directory
Solaris 10 is the first version of Solaris to provide a complex set of variables for controlling password strength.
This project changes the default configuration of the Solaris OS such that ssh is the only network-listening service.
The Solaris Security Toolkit simplifies and automates the process of securing Solaris OS systems and is based on proven security best practices/
Solaris auditing helps to detect potential security breaches by revealing suspicious or abnormal patterns of system usage.
The Solaris Cryptographic Framework provides cryptographic services to users and applications through user-level and kernel-level commands.