Private and public key pairs for SSH
SSH has a key management capacity and related agents.When configured with public key authentication, your key proves your identity to remote SSH hosts
SSH configuration and security best practices
Here is a list of processes and configurations that you can use to tighten and enhance SSH security with regard to remote host access
Turn On/Off Apache Directory Listing
To enable the directory browsing in Apache server, we need to add the directory option in apache configuration file.
Forcing RHEL to prompt for password in Single User mode
By default, RHEL doesn't prompt for a password and we are given root shell directly, as usually Single User mode can be used to reset root password.
Securing access to a Solaris system
This document details some of the focus areas for security and provides suggestions to make it strong.
sadmind daemon vulnerability
In its default configuration sadmind uses a set of clear text Remote Procedure Calls (RPC) to authenticate between two machines.
rkhunter update fails with invalid WEB_CMD configuration option
An update to rkhunter will fail with Invalid WEB_CMD configuration option: Relative pathname: "/bin/false"
Solaris Secure by Default
This project changes the default configuration of the Solaris OS such that ssh is the only network-listening service.
Cryptographic Services Management on Solaris
The Solaris Cryptographic Framework provides cryptographic services to users and applications through user-level and kernel-level commands.
Automated Security Enhancement Tool (ASET)
ASET allows you to monitor and restrict access to system files. It can be configured for three security levels: low, medium, and high.
Sun EEPROM Security
On Sun workstations and servers you can interact with the boot EEPROM (NVRAM) at any time by holding down the STOP (L1) key and pressing the "a" key
Getting the ZFSSA Audit Logs via scripts
The audit log on the ZFS Storage Appliance records user activity events, including login and logout to the BUI and CLI, and administrative actions.
Using SSH login without password
An article outlining steps needed to be able to use the SSH to access a remote system without supplying a password each time that you connect.
NetWorker lockbox password management
NetWorker 7.5 provides a lockbox service that allows NetWorker application modules to securely store and retrieve passwords over the network.
Locking down your Solaris system
With later releases of Solaris, if you want to, you can manually lock down your system using the netstat, svcs and svcadm commands.
Solaris Basic Audit Reporting Tool (BART)
BART is a great little alternative to Tripwire or AIDE. While not so robust or full featured, it does what you need it to do with very little impact.