Strengthen My Privacy - Results from #30 | LinuxSecurity.com

How to strengthen my privacy

Find the HOWTO or step-by-step guide that you need right here.

 

Discover How To Strengthen My Privacy HOWTOs

Security with Keystroke Dynamics

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Are you always looking to expand your security practices? Do you want to take a crack at instituting a whole new way of creating a secure, password infrastructure? If so, this article on keystroke dynamics can help you break into whole new worlds of security... Measure the total time of entry and verify the time between keystrokes to help authenticate a user regardless of the data being entered. Require nonprintable characters, such as backspace and break, in the password to enable new levels of password obfuscation. Learn how to apply the open source tools xev and Perl in keystroke dynamics to measure the more-subtle characteristics of human-computer interaction. The whorls and ridges on your fingertips can identify you based on what you touch. How you touch and especially type can often be just as unique an activity. Keystroke dynamics is a relatively new field that enables identification of individuals through statistical analysis of their typing patterns. Many commercial products analyze the dynamics of password entry, as well as continuous typing monitoring for enhanced security. This article uses example code to demonstrate keystroke dynamics for enhancing the security of your applications in authentication and continuous data entry contexts.

How to: Restrict Users to SCP and SFTP and Block SSH Shell Access with rssh

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A quick HowTo on using secure FTP to transfer files. What is sftp? SCP/SFTP -> SSHD -> Call sftpd subsystem -> Requires a shell -> User can login to server and run other commands. In this article series we will help you provide secure restricted file-transfer services to your users without resorting to FTP. It also covers chroot jail setup instructions to lock down users to their own home directories (allow users to transfer files but not browse the entire Linux / UNIX file system of the server) as well as per user configurations.

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.