Security

The things hackers hate their opponents to have :-)

Getting started with ClamAV Antivirus for Linux

ClamAV is a mostly weak antivirus tool that is meant for scanning emails, but even then you can use it as an antivirus for your personal system. So I decided to make a post on ClamAV which is a free antivirus developed by Cisco, which you can read more about here:
https://en.wikipedia.org/wiki/Clam_AntiVirus

A quick note out there I am using Ubuntu 18.04 to install this, here's my version of an install guide for both via source and the package manager:
[Installing From Package Manager (Bionic Beaver Realease)]
First install the package:

$sudo apt install clamav #installs clamav
$sudo freshclam # attempts to update the database

If the update spits out an error about the freshclam.log file it means you need to find the running process and kill it to do this run:
$sudo lsof /var/log/clamav/freshclam.log
$sudo kill <insert pid here>

and run the freshclam command again.

To uninstall simply run:

 $sudo apt remove clamav

[Installing From Source]
Navigate to https://www.clamav.net/downloads and then download/extract the contents. On your terminal navigate to the directory, and first make a new group and user for clamav:

# groupadd clamav
# useradd -g clamav -s /bin/false -c "Clam AntiVirus" clamav

Then install it:
$ ./configure --sysconfdir=/etc
$ make
$ su -c "make install

Note that you need root priveleges for all of these commands! Also if you want to uninstall it simply navigate back to the extracted folder and run:
$sudo make uninstall

[Scanning Files]

Always remember to update the virus definitions with:

$sudo freshclam

Then you can scan for viruses using this format:

clamscan OPTIONS File/Folder

If necessary start with root permissions: sudo clamscan
Examples:
To check all files on the computer, displaying the name of each file:

clamscan -r /

Unlocking my cellphone. Contract is up.

My contract just ended with Verizon, and I would like to still use my phone with another carrier. I don't have the money right now for a new phone, or I wouldn't even worry about this. Any help would be greatly appreciated. My phone is a:

Samsung
Model: SM-J320V

How to stay as safe from the NSA as humanly possible

Update 18: I said "Darnell can't come."

https://unix.stackexchange.com/questions/84686/how-to-create-custom-comm...
Custom Bash Commands from Binaries (makes it easier to Firejail applications):

1) Create a folder, example here being "SigBin," in your home directory.

mkdir /home/username/SigBin

2) Put Binaries in it.

3) Edit your .bash_profile to use this folder.

nano ~/.bash_profile

#Put this in your bash profile.
export PATH=$PATH":$HOME/SigBin"

4) Reload your profile.

~/.bash_profile

5) Execute the command.

custom-command


Instead of "crushing" the Pentagon with more leaks" or REACTING to their purposeful erasure of the contents of the two guides (I made the Congress section worse in response) for the sole purpose of GUAGING MY EMOTIONAL RESPONSE (a trademark indicator of Cluster B Personality Disorder: without an emotional reaction, a Cluster B can't operate)?

The best LONG-TERM strategy to ensuring that "the incident" gets "magically buried" with my signature and bloody thumbprint as a form of 3-factor (DNA and fingerprint)?

Star Stop catering to the Pentagon's desire to trap my penis live on Spy Satellite while their dysfunctional family (to include little children) observe for the purpose of "identity validation." My penis is tied to the IDENTITY of the Honey-Trapping program that I have REJECTED over 1000 times and the ensnarement of my penis has nothing to do with Nation-State operations.

Linus Torvalds is a fuckface

This is one of those moments that make you want to use *BSD...

https://www.spinics.net/lists/kernel/msg2540934.html

Clearly Linus is a fuckface with a <1 inch dick...

UPDATE: spender's official response - http://seclists.org/oss-sec/2017/q2/583

AnC attack and failure to mention RAP

https://www.vusec.net/projects/anc/ is the attack I'm referring to (code at https://github.com/vusec/revanc). I just wanted to start a discussion about how it's kind of weird that everybody is freaking out despite this being a known problem with ASLR. ASLR was just a bandaid in preparation for RAP, which is now available (see https://grsecurity.net/rap_announce_ret.php). Honestly, I think it's rather sad that there's not a single mention of RAP at any of the discussions I've seen. I guess it just really shows that people at places like https://news.ycombinator.com/item?id=13650611 don't really understand real security. At least there's still SOLDIERX, where you won't get any of that cargo cult security crap Wink

If people keep wasting their time on this old shit, grsecurity is going to be in business for a long time.

Using Snort

Hello there community!

I have a question about using Snort. Are the community rules comprehensive enough to protect a small network? If not, which ruleset would be best?

Link to community rules: https://snort.org/downloads/#rule-downloads

Tor will act as a Gateway

Hello, this alexandra.

In this post, I want to share how to make Tor acts as a Gateway, which we can call Whonix-Gateway and how to run Kali Linux through it. (I want to be clear that you can run whatever OS as a Workstation).
Kali-Workstation will be completed isolated network. Only connections through Tor will be possible.

Before we start, take a look at:
https://en.wikipedia.org/wiki/Gateway_%28telecommunications%29
https://en.wikipedia.org/wiki/Whonix

#Step one

Download VirtualBox and install it.
Learn about it here:
https://en.wikipedia.org/wiki/VirtualBox
https://www.virtualbox.org/wiki/Documentation

#Step two

Download Whonix-Gateway.
Import it into VirtualBox.
(Start Virtualbox, click on File then choose import Appliance.

#Step three

Download the Worksttation that you want.
Learn how to install it into VirtualBox.
Read about internal networking in VirtualBox. (Whonix-Gateway > internal Networking> Workstaion)

#Step four

Start Whonix-Gateway and let it running. You will have to setup it at the first time you boot it up.
(It is pretty easy. Just follow the instructions).

#Step five

Start your Workstation. (Don't turn off Whonix-Gateway)
So, Let's setup it to run trough a Tor Gateway.

* IP Address
192.168.0.20/24
* Gateway
192.168.0.10

#Step six
Setup Networking

In Linux terminal type it
* vi /etc/network/interfaces
It looks like this:

This file describes the network
interfaces available on your system

# and how to to activate them. For more
information, see interfaces (5).

# The loopback network interface

auto lo

iface lo inet loopback

# The primary network interface

allow-hotplug eth0

iface eth0 inet static

address 10.152.152.50

netmask 255.255.255.0

network 10.152.152.0

broadcast 10.152.152.255

gateway 10.152.152.10

# dns-* options are implemented by the
resolvconf package, if installed

dns-nameservers 10.152.152.10

Linux Kernel Security

Hello there!

I wanted to discuss Linux Kernel security and the types of modules this community recommends. I've looked at gresecurity, selinux, and apparmor. I'm wanting to protect a LAMP stack vps system.

how to be a hack

hello ,i am new here. and i want to be hack and make friends with hack ,but i dont know how to do.

Veracrypt replacing Truecrypt?

I was wondering if anyone has used Veracrypt yet, or can verify that it's at least as secure as Truecrypt. It seems to be a fork, but with the controversy surrounding the end of Truecrypt I think consulting with better minds than mine would be beneficial.

https://veracrypt.codeplex.com/

Syndicate content