Install And Configure Arno Iptables On Ubuntu 14.04

Today, we will come to know how we can install and configure arno iptables on Ubuntu 14.04 LTS. This is related to security hardening of your server. A good System Administrator must secure his Linux driven servers. There are many ways we can secure our servers. Setting up a good solid firewall is an essential step to take in securing any modern operating system according to your needs. I will show you how to install & Configure arno iptables On Ubuntu 14.04 LTS for securing your servers.

Source: Install And Configure Arno Iptables On Ubuntu 14.04 (Unixmen)

Installing And Scanning By ClamAV On Ubuntu 14.04 LTS | Unixmen

What is ClamAV?

Clam AntiVirus (ClamAV) is a free and open-source, cross-platform antivirus software tool-kit able to detect many types of malicious software, including viruses. One of its main uses is on mail servers as a server-side email virus scanner. The application was developed for Unix and has third party versions available for AIX, BSD, HP-UX, Linux, OS X, OpenVMS, OSF (Tru64) and Solaris.

ClamAV includes a number of utilities: a command-line scanner, automatic database updater and a scalable multi-threaded daemon, running on an anti-virus engine.

Source: Installing And Scanning By ClamAV On Ubuntu 14.04 LTS | Unixmen

Improve Your Security: Check Your Router Hasn’t Been Hijacked | Gizmo’s Freeware

DNS, or the Domain Name System, is the part of the internet that converts www.techsupportalert.com (which you can understand but which your browser can’t), into an IP address of 72.52.134.16 (which your browser can understand, but which you probably don’t want to).

Source: Improve Your Security: Check Your Router Hasn’t Been Hijacked | Gizmo’s Freeware

Link: How to Write an OAuth Client to Access Data on Other Applications

oauth github authorize

Developers can register an application with GitHub’s OAuth service to access user data.

Using OAuth, a developer can create an independent app that has access to its users’ accounts on other services. For example, Facebook lets developers create games whereby users of the games can post to their own walls on Facebook from within the app. The app doesn’t access the user’s credentials, thus keeping the interaction secure, and the user can at any time revoke the permissions granted to the app.

To accomplish this, Facebook and other services, including Google and GitHub, have implemented an OAuth service. There are two sets of code involved: The code running on the OAuth provider (e.g. Facebook itself), and the code running on the OAuth client (e.g. a site or app that lets you log in with your Facebook credentials). Between these two sets of code, programmers can write OAuth clients, e.g. websites and apps that let people log in using a provider such as Facebook. And that’s what we’re going to cover here.

Full article here:
How to Write an OAuth Client to Access Data on Other Applications (Linux.com)
Related articles:
What the Heck is OAuth? (SitePoint)
Authenticating with Google (Stormpath)
Authentic External: Authenticate users with OAuth providers (PHP Classes)
Python developer articles – OAuth step by step (Python Resources at Memect)
Tutorial: How to Implement Java OAuth 2.0 to Sign-In with GitHub and Google (Java Code Geeks)
Remote Access to Google Spreadsheets using Python, GSpread and OAuth2 (Warehouseman)
Using cURL, BASH and Google oAuth to access Google Analytics (jbmurphy.com)
Using OAuth2 with service account on gdata in python (Stack Overflow)
Upgrade Asterisk to an OAUTH2.0 connection with Google Voice (DSLReports)
Motion Google Drive Uploader for OAuth 2.0 (Jeremy’s Blog)

Link: Hola VPN Sells Users’ Bandwidth, Founder Confirms

The operator of 8chan says the bandwidth of millions of Hola users is being sold for reuse, with some of it even being used to attack his site. Speaking with TorrentFreak, Hola founder Ofer Vilenski says that users’ idle resources are indeed utilized for commercial sale, but that has been the agreement all along.

I don’t endorse the use of this type of service in the first place, but since I know that many people use services such as this to bypass geographic restrictions on content, I think that you should know what you are getting into if you use this particular service.

Full article here:
Hola VPN Sells Users’ Bandwidth, Founder Confirms

Link: How to access a Linux server behind NAT via reverse SSH tunnel

You are running a Linux server at home, which is behind a NAT router or restrictive firewall. Now you want to SSH to the home server while you are away from home. How would you set that up? SSH port forwarding will certainly be an option. However, port forwarding can become tricky if you are dealing with multiple nested NAT environment. Besides, it can be interfered with under various ISP-specific conditions, such as restrictive ISP firewalls which block forwarded ports, or carrier-grade NAT which shares IPv4 addresses among users.

What is Reverse SSH Tunneling?

One alternative to SSH port forwarding is reverse SSH tunneling. …..

Full article here:
How to access a Linux server behind NAT via reverse SSH tunnel (Xmodulo)