Thursday, June 30, 2011

How to create a self-signed SSL Certificate

The following is an extremely simplified view of how SSL is implemented and what part the certificate plays in the entire process.


Normal web traffic is sent unencrypted over the Internet. That is, anyone with access to the right tools can snoop all of that traffic. Obviously, this can lead to problems, especially where security and privacy is necessary, such as in credit card data and bank transactions. The Secure Socket Layer is used to encrypt the data stream between the web server and the web client (the browser).


SSL makes use of what is known as asymmetric cryptography, commonly referred to as public key cryptography (PKI). With public key cryptography, two keys are created, one public, one private. Anything encrypted with either key can only be decrypted with its corresponding key. Thus if a message or data stream were encrypted with the server's private key, it can be decrypted only using its corresponding public key, ensuring that the data only could have come from the server.


If SSL utilizes public key cryptography to encrypt the data stream traveling over the Internet, why is a certificate necessary? The technical answer to that question is that a certificate is not really necessary- the data is secure and cannot easily be decrypted by a third party. However, certificates do serve a crucial role in the communication process. The certificate, signed by a trusted Certificate Authority (CA), ensures that the certificate holder is really who he claims to be. Without a trusted signed certificate, your data may be encrypted, however, the party you are communicating with may not be whom you think. Without certificates, impersonation attacks would be much more common.


read more http://blogmee.info/index.php/how-to-create-a-self-signed-ssl-certificate/

Howto: Linux Lighttpd SSL (Secure Server Layer) Https Configuration And Installation

SSL is cryptographic protocol, which provides secure communications on the Internet for email, web etc.


An SSL certificate is a digital certificate that authenticates the identity of a Web site and encrypts information that is sent to the server using Secure Sockets Layer (SSL) technology. Encryption is the process of scrambling data into an undecipherable format that can only be returned to a readable format with the proper decryption key.


SSL is good if you run ecommerce site or accept payments via CC. It is a good choice to use SSL for user login or registration pages etc.


To purchase a digital certificate, you must first generate and submit a Certificate Signing Request (CSR) to the Certification Authority (CA). The CSR contains your certificate-application information, including your public key. The CSR is generated (using openssl command) with your web server software, which will also create your public/private key pair used for encrypting and decrypting secure transactions.
Requirements




  • Lighttpd webserver with SSL support

  • Dedicated IP assign to your domain i.e. IP based hosting needed

  • SSL certificate from CA

  • Domain name - blogmee.test (for example purpose I am using blogmee.test domain)


Important files on your server


Read more http://blogmee.info/index.php/howto-linux-lighttpd-ssl-secure-server-layer-https-configuration-and-installation/

Business & Finance software for linux P3

Market Analysis System


Grisbi


SQL-Ledger


Lemon POS


Money Manager Ex


jGnash


MyBudget


Read more http://blogmee.info/index.php/business-finance-software-for-linux-p3/


Business & Finance software for linux P2

Qtstalker


Grism


LinuxTrade


TurboCASH


HomeBank


read more http://blogmee.info/index.php/business-finance-software-for-linux-p2/

Business & Finance software for linux

KMyMoney


SureInvoice


GFP


GnuCash


Moneydance


LedgerSMB


Read more http://blogmee.info/index.php/business-finance-software-for-linux/

Microsoft Wants to Patent High-Tech Snoop Software

A recently surfaced Microsoft patent focuses on technology that could be used to spy on VoIP users' conversations without the detection of participants. Redmond originally applied for the patent in 2009, well before its move to buy up VoIP provider Skype. This technology may have been developed with an eye to selling it to government agencies.


Microsoft has applied for a patent on technology that may let its user secretly intercept Voice over IP (VoIP) communications, amend the content and store it.


The application was filed in December 2009 and was recently made public.


The technology could allow the monitoring of conversations, voice messages and video conferences over a variety of devices, including smartphones, laptops and gaming devices.


This technology may have been developed with an eye to selling it to government agencies.


"Sometimes a government or one of its agencies may need to monitor communications between telephone users," the patent application reads.


Microsoft spokesperson Emma Mahoney pointed out that the application is still being processed.


"The [U.S. Patent office] will publish patent applications approximately 18 months after a company files a patent application," Mahoney told TechNewsWorld. "It is one stage of the application process."


Mahoney declined to discuss the technology further.



Surfing and Spying


The patent application, number 20110153809, states data associated with a request to establish a communication is "modified to cause the communication to be established via a path that includes a recording agent."


Such modification may include "adding, changing and/or deleting data within the data."


That modified data is then passed to a protocol entity that uses it to establish a communication session using a path that includes the recording agent, which is "then able to silently record the communication," the application says.


Communications that can be intercepted may be conducted over computers, laptops, set-top boxes, programmable consumer electronics devices, personal digital assistants (PDAs), smartphones, gaming devices, printers, computing devices in automobiles and home media centers, the application states.


The technology can be used not only on VoIP devices but also on any other form of packet-based communication used to transmit audio over a wireless or wired network, Microsoft's application reads.


In other words, the technology would allow the government can spy on a user when using any Internet-enabled device.


The recording can be done in secret by indicating there are no direct paths between the two parties trying to communicate.



SIPping on the Datastream


In the Session Initiation Protocol (SIP), which is widely used in VoIP audio and video communications, for example, Microsoft's technology will remove local candidates from a list of available candidates in the protocol's parameters when the two parties do a handshake to set up the communication.


This will force both parties to go through a Traversal Using Relay NAT (TURN) relay server.


TURN is a simple protocol that allows for a device behind a NAT (network address translator), or firewall, receive incoming data over TCP or UDP connections


UDP, or User Datagram Protocol, is one of the core elements in the Internet Protocol Suite. It lets computer applications send messages, known as "datagrams," to other devices on an IP network.



Privacy and the State


Governments at all levels in the United States have been battling with civil liberties groups and citizens over the question of privacy.


For example, the Electronic Frontier Foundation on Monday put up an advisory on how citizens can protect their computers and phones from illegal police searches.


Security activist Christopher Soghoian, who is also a PhD candidate at the University of Indiana, in April published a paper on the law enforcement surveillance reporting gap, which states, in essence, that most modern surveillance takes place entirely off the books and its scope remains unknown.


He proposed legislative reporting requirements "in order to enable some reasonable degree of oversight and transparency over all forms of law enforcement electronic surveillance."


"This patent points out the high cost that business, and by extension customers, pay for surveillance," Christopher Calabrese, legislative counsel for the American Civil Liberties Union, told TechNewsWorld.


"Because government doesn't bear the full cost of these services they will be more likely to use more surveillance because it is, in essence, subsidized by businesses and consumers," Calabrese added.

Wednesday, June 29, 2011

Lighttpd webserver setup with php5 mysql on Ubuntu

Security, speed, compliance, and flexibility -- all of these describe lighttpd (pron. lighty) which is rapidly redefining efficiency of a webserver; as it is designed and optimized for high performance environments. With a small memory footprint compared to other web-servers, effective management of the cpu-load, and advanced feature set (FastCGI, SCGI, Auth, Output-Compression, URL-Rewriting and many more) lighttpd is the perfect solution for every server that is suffering load problems. And best of all it’s Open Source licensed under the revised BSD license.


Installing Lighttpd in Ubuntu


Read more http://blogmee.info/index.php/lighttpd-webserver-setup-with-php5-mysql-on-ubuntu/

Lighttpd Alternative To Apache

Lighttpd (pronounced "lighty")is an open-source web server more optimized for speed-critical environments than common products while remaining standards-compliant, secure and flexible. It was originally written by Jan Kneschke as a proof-of-concept of the c10k problem - how to handle 10,000 connections in parallel on one server,but has gained worldwide popularity.


Read more http://blogmee.info/index.php/lighttpd-alternative-to-apache/

Tuesday, June 28, 2011

KLOXO Free Web Hosting Control Panel

Kloxo (formerly known as Lxadmin) is a free, opensource web hosting control panel for the Red Hat and CentOS Linux distributions.


Kloxo allows the host administrators to run a combination of lighttpd or Apache with djbdns or bind, and provides a graphical interface to switch between these programs without losing data. Kloxo Enterprise can transparently move web/mail/dns from one server running Apache to another running lighttpd. It is also known as a good free alternative to cPanel hosting control panel.


Read more http://blogmee.info/index.php/kloxo-free-web-hosting-control-panel/

Backup Software in LINUX P5

37. Dump


38. FlyBack


39. KDat


40. Areca


41. Memopal


42. Bacula Client


43. Konserve


44. rsnapshot


45. SystemImager Server


46. Backupninja


47. rsyncrypto


48. drsync


Read more http://blogmee.info/index.php/backup-software-in-linux-p5/

Backup Software in LINUX P4

26. Parchive


27. R1Soft Hot Copy


28. Flamethrower


29. File Roller


30. HUBackup


31. Hydra Backup


32. JungleDisk


33. Duplicity


34. cpio


34. iBackup


35 . rdiff-backup


35. PyPar2


36. Bacula


Read more http://blogmee.info/index.php/backup-software-in-linux-p4/

Backup Software in LINUX P3

18.PowerFolder


19.Ark


20.Unison Gtk


21. AIR


22. KDar


23. rsync


24. Keep


25. dd


Read more http://blogmee.info/index.php/backup-software-in-linux-p3/

Backup Software in LINUX P2

9. pyBackPack


10.TimeVault


11. Time Drive


12. Simple Backup


13 . QSync


14. SBAdmin


15. Cedar Backup


16. ZRM for MySQL


17. CDBackup


Read more http://blogmee.info/index.php/backup-software-p2/

Backup Software in LINUX

1 . TestDisk


2. FreeNAS

3. SpiderOak

4.Partition Image

5. Mondo

6. Back In Time

7. Grsync

8. BackupPC

read more http://blogmee.info/index.php/backup-software-in-linux/