Difference between revisions of "Security"
From Linuxintro
imported>ThorstenStaerk (New page: = encrypted image as safe = Have aes and cryptoloop loaded dd if=/dev/zero of=/save.img bs=1024k count=100 --> creates an image of 100 MB losetup -e aes /dev/loop0 /save.img (mit -d kan...) |
imported>ThorstenStaerk |
||
(6 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
− | + | Wikipedia structures [http://en.wikipedia.org/wiki/Information_security (information) security] into three parts: confidentiality, integrity and availability. This article deals with confidentiality and integrity, for securing your data's availability, see [[backup]]. | |
− | |||
− | |||
− | |||
− | + | = Disk = | |
− | + | * [[encrypt a disk]] | |
− | + | * [[undelete files]] | |
− | + | * [[shred|delete files making them unrestorable]] | |
− | + | ||
− | + | = Web Services = | |
− | + | * [[set up Apache with https]] | |
− | + | * [[john the ripper]] - check for weak passwords | |
− | + | ||
− | + | = Network = | |
+ | * [[firewall]] |
Latest revision as of 08:17, 25 January 2012
Wikipedia structures (information) security into three parts: confidentiality, integrity and availability. This article deals with confidentiality and integrity, for securing your data's availability, see backup.
Disk
Web Services
- set up Apache with https
- john the ripper - check for weak passwords