[mdlug] Linux Certification at CompTIA
Kirk Ellis
kirk at thatcybersecurityguy.com
Fri Oct 17 18:53:11 EDT 2014
Hi Andrew,
I was a UNIX administrator during much of my former 28 year IT career.
After surviving cancer twice due to radiation exposure during the Iraq
war I found the demand for UNIX administrators dismal at best. So I
pursued and obtained the CompTIA Linux+ certifications and you might
want to also. Getting these certifications taught me about the
differences between Linux and UNIX which are MANY. Visit
http://certification.comptia.org/getCertified/certifications/linux.aspx
to read about their latest certifications. However, much like getting
CISCO certified you may have to proceed past the LX0-101 and LX0-102
certifications to get a better than entry level job.
As for mentoring I am busy launching my new ThatCyberSecurityGuy.com
business but I can offer want I can as my heart bleeds for anyone out of
a job looking for work. I will be printing what is called in the book
publishing business a PrePublication run of my book "The Internet is
Infected" in early November and I would be happy to provide you a copy
of my book at printing cost to help you out. All I would ask in return
is for you to show the book around (notice I did not say lend) as I am
in the book selling business!
Below is the Table of Contents for my book. Of interest to you as a
Linux Administrator are Chapter 7 on the virtualization of four Linux
Operating Systems and Chapter 9 on how to set up and use a SSH server.
I'm sure some of the other material in the book would prove beneficial
to you also. The purpose of my 1000 page book is to help everyone using
the infected Internet and if I can start by being a mentor to an out of
work Linux Administrator then I feel I am fulfilling my new mission in life.
Good luck and god bless,
Kirk A. Ellis
Open Source, Donationware, and Freeware Projects Coverered in this
Book.. IV<#_Toc401335138>
About the Author. XIV<#_Toc401335139>
Acknowledgements. XV<#_Toc401335140>
Preface – Background Information and Preparation.. XIX<#_Toc401335141>
How and Why this Book came into Existence. XX<#_Toc401335142>
There Comes a Time in History for Every Revolutionary Book.
XXII<#_Toc401335143>
Everyone is Spying on your Internet Activity and Storing it Permanently
for your Lifetime. XXV<#_Toc401335144>
The U.S. Digital Fourth Amendment!XXVII<#_Toc401335145>
Warning—Disclaimer. XXIX<#_Toc401335146>
Who Should Read This Book?. XXXI<#_Toc401335147>
What You Will Need to Employ the Techniques Described in This Book.
XXXIII<#_Toc401335148>
Conventions Used in This Book. XXXV<#_Toc401335149>
Introduction--Why You Need to Read This Book.. XXXVII<#_Toc401335150>
Why I Wrote This Book about Using the Infected
InternetXXXVIII<#_Toc401335151>
A Quick Review of the Usual, Inadequate Methods for Securing Your
Internet Activity That We Hear About DailyXL<#_Toc401335152>
What This Book Aims to Do for the Reader. XLVIII<#_Toc401335153>
Chapter 1 - Government and Corporate Efforts to Stifle Internet Freedom,
Invade Your Privacy and Destroy Your Health... 1<#_Toc401335154>
>From the Perspective of a Make Believe Post WWII German Reporter Who I
Now Am!6<#_Toc401335155>
Whistle-Blower Edward Snowden Reveals He Ratted on the NSA..
11<#_Toc401335156>
How the American Stazi State Security* System is Costing Their Taxpayers
Many Billions to Spy on the Whole World.. 18<#_Toc401335157>
Your Digital Trail/Footprint--How You Are Being Tracked in Everything
You Do Using the Infected Internet!27<#_Toc401335158>
How the Consumer Financial Protection Bureau Has Become the Second Most
Well-Funded U.S. Government Agency to Invade the U.S. Citizens' Privacy
Funded by U.S. Citizens. 34<#_Toc401335159>
Future and Past Efforts by the U.S Government to Further Circumvent the
U.S. Constitution and Erode U.S. and Worldwide Citizens' Freedom..
34<#_Toc401335160>
Examples of the Threats Corporations, SBO's and HCU's Face from the
Internet. 39<#_Toc401335161>
Don't Be a Sheep, Become a Shepherd, Stop Snail Mail and, Change your
Diet!49<#_Toc401335162>
The Elephant in the Room; Lets Crunch the Numbers on What Is Really
Killing Western Civilizations' Citizens!56<#_Toc401335163>
Chapter 2 -- Hardening your Network--Implementing Wireless Security
Settings--Getting the Best Network and Internet Performance--Configuring
Your Router to Support Your Mobile Devices.. 67<#_Toc401335164>
Historical Examples of Advancing Technology Overwhelming Defenses.
69<#_Toc401335165>
Your Router and Network Wi-Fi Equipment May Be More Vulnerable than you
Thought. 75<#_Toc401335166>
Setting Up a Router and Repeater. 80<#_Toc401335167>
Hardening the Basic Network and Wireless Router Settings. 83<#_Toc401335168>
Hardening Wireless Access by Setting up a Wireless Card Access List
(Also Known as MAC Filtering)87<#_Toc401335169>
Hardening Router Visibility by Turning off SSID Broadcast--Backing up
the Basic Router Settings89<#_Toc401335170>
Hardening Network Access by Disabling Router Ports. 90<#_Toc401335171>
Block Services to Test SSH and VPN Tunnels. 92<#_Toc401335172>
Hardening the Domain Name Service (DNS) Setup and Achieving Better DNS
Performance. 92<#_Toc401335173>
Setting up Dynamic DNS as a Permanent Domain to Use Your Home Network
while Traveling with Your Mobile Devices. 93<#_Toc401335174>
Setting up an Address Reservation for Your Home Printer and Assigning a
Static (Unchanging) IP Address95<#_Toc401335175>
Setting up Port Forwarding and Address Reservations for Your Home
Servers to Use Them Remotely while Traveling.. 96<#_Toc401335176>
Setting up Quality of Service in Your Router and Wireless Devices for
Streaming Video and Gaming, Keeping the Family Happy. 98<#_Toc401335177>
The Wireless Multimedia Checklist for Gaming and Streaming Video..
98<#_Toc401335178>
Setup a Guest Network for Meetings, Relatives and Visitors.
102<#_Toc401335179>
So You Have Purchased a Shiny New 802.11ac Router--Now What?.
104<#_Toc401335180>
Dirty Electricity:Do You Need to Be Concerned?. 105<#_Toc401335181>
Fixing Difficult Wi-Fi Problems. 106<#_Toc401335182>
Summary - Physical Internet Communication Layer. 107<#_Toc401335183>
Chapter 3 -- Understanding the Computer Hardware Needed for
Virtualization and Gaming-Building Your Own Computer Server..
109<#_Toc401335184>
Precautions & Hardware 101 Tips to Building the Ultimate New Computer
Server. 117<#_Toc401335185>
Case-Evaluating and Choosing.. 121<#_Toc401335186>
Case Fans-Choosing and Installing.. 125<#_Toc401335187>
CPU-Choosing and Installing. 125<#_Toc401335188>
Hard Drive-Selection, Technical Information and Installation..
130<#_Toc401335189>
Zeroing Your Hard Drive to Install a New OS--Recovering your Data.
133<#_Toc401335190>
Running RAID in Your SB/HC and Recovering from Hard Drive Failure.
135<#_Toc401335191>
Recovering Hard Drive Data from a Computer That Will No Longer
Boot138<#_Toc401335192>
Motherboard-Selection and Technical Information.. 139<#_Toc401335193>
Thunderbolt and USB 3.0 Devices and Connectors. 140<#_Toc401335194>
SATA Revision 3.0 (SATA 6 GB/s) and Intel Rapid Storage. 141<#_Toc401335195>
What is Serial ATA Revision 3.0?. 141<#_Toc401335196>
What are the benefits of SATA 6Gb/s?. 141<#_Toc401335197>
What is Intel Rapid Storage?. 142<#_Toc401335198>
Motherboard Selection How-To. 142<#_Toc401335199>
Checking and Flashing the Computer BIOS. 147<#_Toc401335200>
Power Supply Unit (PSU)--Choosing and Installing.. 149<#_Toc401335201>
RAM Memory-Choosing and Installing.. 153<#_Toc401335202>
RAM Memory-Installing. 156<#_Toc401335203>
Video Card -- Choosing and Installing.. 157<#_Toc401335204>
Monitor Choosing and Installing.. 159<#_Toc401335205>
Blue Ray DVD Burner-Choosing and Installing.. 160<#_Toc401335206>
Backup-Solution Selection and Technical Information.. 161<#_Toc401335207>
Keyboard and Mouse-Choosing and Configuring.. 162<#_Toc401335208>
Laser/InkJet Multifunction Printers-Choosing.. 163<#_Toc401335209>
Troubleshooting Network Printers. 165<#_Toc401335210>
Using Surge Protector Vampire Hunters to Lower Your Electric Bill &
Protect Your Equipment166<#_Toc401335211>
Laptops-Specifications--Changing the Hard Drive--Securing..
168<#_Toc401335212>
How to Swap the Hard Drive in Your Laptop. 170<#_Toc401335213>
When Possible, Lock Your Laptop:170<#_Toc401335214>
Sextortion, Put Tape over Your Laptop Webcam When You Are Not Using
It171<#_Toc401335215>
Label Your Mobile Devices and Keep the Fans Open. 172<#_Toc401335216>
Track Your Laptop. 173<#_Toc401335217>
Extending Laptop Battery Life and Purchasing Extra Battery Life.
173<#_Toc401335218>
Caring for Your Computer, Laptop and Monitor. 174<#_Toc401335219>
Cleaning a LCD Monitor, HDTV, Phone and Camera Display. 176<#_Toc401335220>
Recycle Your Old or Failed Tech Devices, Computer Equipment, and
Batteries to Save the Environment177<#_Toc401335221>
Recycle Your Failed Hard Drives, Old or Unusable CDs and DVDs to Save
the Environment. 180<#_Toc401335222>
Smartphone Dropped in Water, Liquid Dumped on a Keyboard or Laptop--What
Now?. 183<#_Toc401335223>
Summary -- A Sample 2014 Computer Server Setup. 183<#_Toc401335224>
Chapter 4 -- Getting and Keeping Your Business/Home Continuously
Connected to the Internet through an ISP.. 185<#_Toc401335225>
Working From Home – How to Talk to Your ISP.. 185<#_Toc401335226>
Working From Home - Do You want to Use Your ISP's Provided Equipment and
DNS?. 186<#_Toc401335227>
Alternatives to Your ISP's DNS for Better Speed and Security.
188<#_Toc401335228>
Can Your ISP Technician Use the Advanced Technical Equipment Provided by
Their Company?189<#_Toc401335229>
Dial-up vs. DSL vs. Cable vs. Fiber. 191<#_Toc401335230>
Establish a Service Contract and Service Level Agreement with Your ISP..
192<#_Toc401335231>
Intermittent Outages to Cable Internet and Cable TV, What Can You Do?.
193<#_Toc401335232>
Intermittent Outages to DSL Internet, What Can You Do?. 197<#_Toc401335233>
Your ISP Web Site May Be Separate from Your ISP Email & Account.
198<#_Toc401335234>
Summary-ISP Infrastructure, Testing the Final Result. 198<#_Toc401335235>
Chapter 5 -- Using Encryption Software and Tools to Protect Your USB
Drives, Email, Files and Folders, and to Verify Your Downloads Is
Mandatory for Data Exchange with SBO Partners201<#_Toc401335236>
Cryptography, What Is It, How Does It Work and Why Do You Need It?.
209<#_Toc401335237>
Windows 7-Adding Tools & Utilities to the System PATH... 211<#_Toc401335238>
Windows 7 -- Verifying Downloads Before Installation.. 212<#_Toc401335239>
Boxcryptor-To Encrypt Individual Files for Syncing with the Cloud..
213<#_Toc401335240>
TrueCrypt-Encrypting USB Drives and Folders. 215<#_Toc401335241>
BitLocker-Encrypt Folders, Hard Drives and USB Drives. 219<#_Toc401335242>
Microsoft Office -- How-To Password Protect & Unprotect Your Documents.
220<#_Toc401335243>
How Secure Is Microsoft Office Encryption?. 221<#_Toc401335244>
Linux -- Using GnuPG with SSH for Encryption Automation..
222<#_Toc401335245>
GnuPG -- Generating Key Pairs -- Verifying Pubic Keys for the Exchange
of Encrypted Data and Email226<#_Toc401335246>
GunPG -- Signing and Assigning Trust Levels to Public Keys.
230<#_Toc401335247>
GnuPG--Digital Signatures and Why They Are Important238<#_Toc401335248>
GnuPG -- Scripting Encryption and File Transfer with Your Partners.
240<#_Toc401335249>
Encrypting Emails Before Sending Them over the Internet -- Don’t Expose
Your Correspondence to Crackers Everywhere. 270<#_Toc401335250>
Encrypting Email with Outlook and Encipher.it272<#_Toc401335251>
Use Multiple Email Addresses for Your Correspondence. 273<#_Toc401335252>
Windows 7 -- Using Gpg4win and Claws to Encrypt Emails & Files.
277<#_Toc401335253>
Thunderbird -- Using Enigmail to Encrypt Emails. 283<#_Toc401335254>
Windows 7 -- Using GnuPG to Encrypt Files for Your OneDrive or Mobile
Devices. 287<#_Toc401335255>
FreeOTFE-Explorer a Deprecated Project to Create Encrypted Folders.
290<#_Toc401335256>
Androsa--A Deprecated Graphical Tool to Encrypt Files. 291<#_Toc401335257>
Chapter 6 -- Windows 7 -- Loading, Configuring and Setting Up Free and
Useful Applications, Tools and Utilities.. 293<#_Toc401335258>
Windows 7 -- After Loading the OS. 297<#_Toc401335259>
How to Configure and Load Up a Desktop or Laptop Computer with All the
Tools and Utilities You Will Ever Need.. 303<#_Toc401335260>
Window 7 -- 101 Steps to Configuring and Loading up the Desktop or
Laptop Hard Drive with Useful Software306<#_Toc401335261>
SpiderOak -- Encrypting and Syncing up Your Contacts, Finance, and
Investment Data.. 324<#_Toc401335262>
Privacyfix Add-On to Check Your Privacy Settings. 328<#_Toc401335263>
Ghostery Add-On to Harden Browsing.. 329<#_Toc401335264>
Disconnect.me Add-On to Harden Browsing.. 330<#_Toc401335265>
Albine's "Do Not Track Me" to Block Cookies and Trackers.
330<#_Toc401335266>
Internet Explorer -- Setup & Hardening your Browser Security.
331<#_Toc401335267>
Internet Explorer-Add-ons to Harden Browsing. 335<#_Toc401335268>
Internet Explorer -- Get Rid of the Bloatware*. 335<#_Toc401335269>
Firefox -- Setup & Hardening your Browser Security. 336<#_Toc401335270>
Firefox -- Add-Ons to Harden Browsing, Encrypt Web Activity and Protect
You. 338<#_Toc401335271>
Firefox -- Backing Up and Restoring Your Bookmarks. 345<#_Toc401335272>
Browser Diagnostics if Add-Ons Conflict or Drag down Performance.
345<#_Toc401335273>
Windows 7 Explorer Demystified -- How-To Open up the Directories, Files
and Programs You Use the Most with only a Few Clicks of the
Mouse!346<#_Toc401335274>
Windows 7 Explorer--File Locations. 347<#_Toc401335275>
Windows 7 Explorer -- Creating a Shortcut Home Directory & Adding
Favorites. 347<#_Toc401335276>
Windows 7 Explorer -- Desktop Shortcuts Setup and Use. 348<#_Toc401335277>
Windows 7--Problem Steps Recorder (PSR) Tool. 352<#_Toc401335278>
Windows 7 -- Using GodMode to Quickly Navigate to all Your
Administrative Needs. 353<#_Toc401335279>
Windows 7 -- Repair Device Drivers Using Safe Mode and Other Methods.
353<#_Toc401335280>
Windows 7 -- FlashCookieView to View Your Flash Cookies. 354<#_Toc401335281>
Windows 7--How to Find and Kill a Runaway Process in Windows That Keeps
Reappearing.. 355<#_Toc401335282>
Chapter 7 -- Using Virtualization in Windows or Linux to Host a Guest
OSs to Harden and Layer Our Computer Defenses.. 357<#_Toc401335283>
Virtualization Solutions You Can Use on Your Core Operating System..
360<#_Toc401335284>
Advantages and Disadvantages of the Various Virtualization Solutions.
362<#_Toc401335285>
Network Address Translation -- Using NAT.. 364<#_Toc401335286>
Hacking -- A Simple Exercise Using NMap to Scan Home Networks and
Computers. 365<#_Toc401335287>
Hardening Your Financial, E-commerce, and General Internet Activity
Using Virtualization369<#_Toc401335288>
Linux Desktops, Applications, Software, Packages, Utilities and Tools.
369<#_Toc401335289>
Virtual Machine Name Standardization.. 372<#_Toc401335290>
Parallels -- Creating Virtual Guest Operating Systems. 375<#_Toc401335291>
Parallels -- Manual Installation of Parallel Tools. 376<#_Toc401335292>
VMware Player -- Creating Virtual Guest Operating Systems.
378<#_Toc401335293>
VMware Player -- Manual Installation of VMware Tools. 382<#_Toc401335294>
Navigating the Menu Structure to Install Tools Manually. 383<#_Toc401335295>
Command Line Installation of VMware Tools. 385<#_Toc401335296>
VirtualBox -- Creating Virtual Guest Operating Systems. 386<#_Toc401335297>
VirtualBox -- Installing the VirtualBox Guest Additions. 392<#_Toc401335298>
BackTrack/Kali/Mint/Ubuntu--VirtualBox Guest Additions. 393<#_Toc401335299>
OpenSUSE -- VirtualBox Guest Additions. 396<#_Toc401335300>
Fedora -- VirtualBox Guest Additions. 396<#_Toc401335301>
Windows Vista/XP -- VirtualBox Guest Additions. 397<#_Toc401335302>
Command Line -- Using It in Windows and Linux. 398<#_Toc401335303>
Terminal Window -- Customizing the Linux Command Line to Make Life Easy.
401<#_Toc401335304>
GParted -- Manually Creating Partitions. 416<#_Toc401335305>
Kali/BackTrack -- General Description -- Install & Update in VMware
Player &VirtualBox. 420<#_Toc401335306>
Kali-Debian -- Install and Setup in VirtualBox & VMware Player.
423<#_Toc401335307>
BackTrack -- GNOME/KDE -- Setup in VirtualBox & VMware Player.
424<#_Toc401335308>
Mint -- General Description.. 425<#_Toc401335309>
Mint 17 -- Cinnamon Install in VirtualBox & VMware Player.
426<#_Toc401335310>
Mint 17 -- KDE/MATE/XFCE-Install in VirtualBox & VMware Player.
427<#_Toc401335311>
Mint-Debian 201403 Mate or Cinnamon Install in VirtualBox & VMware
Player. 428<#_Toc401335312>
Mint-201403-mate-cinnamon-dvd Setup in VirtualBox & VMware Player.
430<#_Toc401335313>
Ubuntu 14.04 LTS LTS -- General Description.. 431<#_Toc401335314>
Ubuntu -- Continued Install into VirtualBox & VMware Player.
432<#_Toc401335315>
Ubuntu 11.04-Where Art Thou?Oh How We Miss You!433<#_Toc401335316>
Ubuntu -- Root Login Setup. 434<#_Toc401335317>
Ubuntu -- Timezone and Distribution Upgrade. 435<#_Toc401335318>
Ubuntu -- General Setup after Install in VirtualBox & VMware Player.
436<#_Toc401335319>
Ubuntu -- 14.04/13.10/12.04 LTS-Setup libdvdcss Repository.
438<#_Toc401335320>
Mint-Ubuntu -- Finance Virtual Machine Creation.. 440<#_Toc401335321>
KMyMoney -- Installing, Configuring and Using in a KDE VM...
441<#_Toc401335322>
GnuCash -- Installing, Configuring and Using in a GNOME VM...
443<#_Toc401335323>
Keepass -- Installing and Using in a Linux VM... 445<#_Toc401335324>
Backtrack/Kali/Mint/Ubuntu--VM Setup Steps after Install.
447<#_Toc401335325>
BackTrack/Kali/Mint/Ubuntu--Applying Software Updates & Package
Management. 448<#_Toc401335326>
Mint/Ubuntu -- Flash Player Installation.. 449<#_Toc401335327>
Mint/Ubuntu -- Installing Additional Drivers, Applications, Tools &
Utilities in Debian-Based Linux451<#_Toc401335328>
Fedora -- General Description.. 474<#_Toc401335329>
Fedora -- Install in VirtualBox & VMware Player. 475<#_Toc401335330>
Fedora--Continued Install after Reboot in VirtualBox & VMware Player.
478<#_Toc401335331>
Fedora 17 -- Historical Reference About Continued Install after Reboot
in Oracle VirtualBox. 479<#_Toc401335332>
Fedora -- Enable 'root' Login. 482<#_Toc401335333>
Fedora -- General VM Configuration, Repository Setup, Applying Updates.
483<#_Toc401335334>
Fedora -- Using the Command Line to Add the RPM Fusion Repository.
485<#_Toc401335335>
Fedora -- Guided Steps to Set Up Your OS. 487<#_Toc401335336>
Fedora -- Flash Player Installation and Configuration. 488<#_Toc401335337>
Fedora -- Installing Additional Applications, Tools & Utilities.
490<#_Toc401335338>
Fedora -- A Lesson in Starting and Stopping Services Automatically.
506<#_Toc401335339>
OpenSUSE -- General Description.. 507<#_Toc401335340>
OpenSUSE -- Install in VirtualBox & VMware Player. 508<#_Toc401335341>
OpenSUSE -- Continued Install after VM Reboot in VirtualBox.
508<#_Toc401335342>
OpenSUSE -- Setup in VMware Player after VM Creation. 512<#_Toc401335343>
OpenSUSE -- General VM Configuration, Applying Updates. 513<#_Toc401335344>
OpenSUSE -- Repository Setup & Tools Update. 516<#_Toc401335345>
OpenSUSE -- General Configuration for GNOME 3D and Fallback.
520<#_Toc401335346>
OpenSUSE -- Install Additional Applications, Tools & Utilities.
520<#_Toc401335347>
GNOME Desktop -- Fedora-Mint General Configuration & Setup.
535<#_Toc401335348>
KDE Desktop -- Fedora-Mint-openSUSE General Configuration & Setup.
536<#_Toc401335349>
Adding Fonts to Linux. 538<#_Toc401335350>
Adding Less Privileged User IDs for Specific Purposes to Linux.
540<#_Toc401335351>
Using the Lynx Text-Based Browser. 544<#_Toc401335352>
Windows-Vista/XP -- Install and Setup in VirtualBox and VMware Player.
545<#_Toc401335353>
Starting and Stopping Parallels & VMware Player and its Services to Keep
Your Computer Finally Fast!547<#_Toc401335354>
Chapter 8 -- Prevent Corporations from Stalking You--How To Use the Tor
Network, a Proxy, or JonDonym to Cloak Your Browser Activity (Surf
Anonymously) in a Virtual OS.. 554<#_Toc401335355>
Develop a Split Personality While Using the Infected Internet.
559<#_Toc401335356>
Why Do We Need Anonymization When Using the Internet?. 560<#_Toc401335357>
What the Internet Search Engine Privacy Statements Tell You..
566<#_Toc401335358>
Use a Web Proxy or Web Proxy Server to Be More Anonymous.
566<#_Toc401335359>
How the US Government Can Probably Track You Even If You Are Using Tor.
567<#_Toc401335360>
Tor -- How It Works, Tor Drawbacks, Everything Done Using Tor Is Not
Safe. 569<#_Toc401335361>
JonDonym as an Alternative to Tor. 572<#_Toc401335362>
Tails -- Live DVD or USB Install for Anonymity. 573<#_Toc401335363>
Whonix -- Anonymity OS Solution.. 574<#_Toc401335364>
Tor Bundle -- Install & Set Up in Any Linux OS as a Non-Root User.
575<#_Toc401335365>
Windows 7/Vista/XP -- How-to Install, Run and Set Up Tor.
579<#_Toc401335366>
Firefox -- Hardening the Browser to Use with the Tor Daemon and Proxy.
579<#_Toc401335367>
Mint/Ubuntu -- Installing Tor Daemon and Supporting Software.
580<#_Toc401335368>
Vidalia -- Setting Up and Using It, Manage or Relay Tor TBB or Daemon..
591<#_Toc401335369>
Fedora -- Installing Tor Daemon and Supporting Software. 592<#_Toc401335370>
Tor/Polipo/Privoxy Proxies -- General Information.. 595<#_Toc401335371>
Fedora -- Install and Chain the Polipo Proxy to the Tor Proxy.
598<#_Toc401335372>
Fedora -- Other Polipo Proxy Configuration Settings to Consider.
600<#_Toc401335373>
Ubuntu/Mint -- Install and Chain the Polipo Proxy to the Tor Proxy.
603<#_Toc401335374>
Privoxy--Install and Chain the Privoxy Proxy to the Tor Proxy.
605<#_Toc401335375>
Anonymity Testing and Final Commentary. 607<#_Toc401335376>
Chapter 9 -- Hardening Security Using Your Mobil Devices by Setting Up
and Using an SSH Server on Your Remote Secure Network.. 609<#_Toc401335377>
Tunnels -- What Are They, and How Can We Use Paid VPN Services to Keep
Ourselves Secure at Hotspots Everywhere. 616<#_Toc401335378>
OpenSSH Server for Your SB/HC -- What Hardware Is Needed?.
619<#_Toc401335379>
Zero the Hard Drives and Install the Ubuntu OS on Your Server.
621<#_Toc401335380>
Backing up Important System Files. 621<#_Toc401335381>
Unchanging/Static IP -- Setting It up in Ubuntu Desktop. 622<#_Toc401335382>
OpenSSH Server -- Installation and Configuration.. 624<#_Toc401335383>
SSH Client -- Obtaining, Installing and Setting Up Software on Our
Mobile Devices to Access Our Secure SSH Server Remotely628<#_Toc401335384>
Dynamic SSH Domain--Creating an Unchanging Domain to Connect to Your
Private Network from Anywhere630<#_Toc401335385>
Using Software Firewalls to Harden Security and Block Ports.
631<#_Toc401335386>
Linux SSH Client -- Establishing the First Client Connection with Our
Linux SSH Server & the Copy of Our Client Public Key to the SSH Server.
635<#_Toc401335387>
Macintosh SSH Client--Establishing the First Client Connection with Our
Linux SSH Server & the Copy of Our Client Public Key to Server.
639<#_Toc401335388>
Windows PuTTY Client -- Establishing the First Client Connection to a
Linux SSH Server & the Copy of Our Client Public Key to the Server.
640<#_Toc401335389>
Windows PuTTY -- Using the Command Line to Establish the First SSH
Connection. 642<#_Toc401335390>
Dynamic Port Forwarding -- Establishing a Dynamic SSH Tunnel Using the
Command Line to Secure Our Browser Activity at Hotspots. 645<#_Toc401335391>
Dynamic Port Forwarding -- Establishing a Dynamic SSH Tunnel Using the
Putty GUI to Secure Our Browser Activity at Hotspots. 648<#_Toc401335392>
Firefox/Internet Explorer and Hotmail SOCKS5 Configuration for Our
Dynamic Tunnel649<#_Toc401335393>
Local Port Forwarding -- To Secure Internet Applications that Can't use
SOCKS. 651<#_Toc401335394>
Using X11 Forwarding from Your SSH Server to Your Client655<#_Toc401335395>
GNOME Secure Shell Tunnel Manager -- Graphical Tool to Manage Tunnels in
Linux. 659<#_Toc401335396>
Securing Windows Live OneDrive and Other Internet Applications on Your
Mobile Device while on the Road to Keep Them from Automatically
Connecting to a Public Network.. 660<#_Toc401335397>
Thunderbird -- Setting Up Gmail in a Linux VM... 664<#_Toc401335398>
Thunderbird & Windows Live Mail -- Setting up Gmail to Use an SSH
Tunnel. 665<#_Toc401335399>
Using an SSH Tunnel to Forward Email Ports and Use Dynamic Port
Forwarding for the Web Browser to Keep Your Laptop Secure while on the
Road.. 668<#_Toc401335400>
SSH Server -- Secure Connections & File Transfer Using SSH Public &
Private Keys. 669<#_Toc401335401>
SSH Public/Private Key Establishment Between an SSH Client & SSH Server.
677<#_Toc401335402>
SSH Agent, Specific Purpose Keys, Using authorized_keys to Restrict
Access. 683<#_Toc401335403>
PuTTY-SSH File Transfer Using a Fully Empowered Windows
Client690<#_Toc401335404>
Linux/MAC -- SSH Client & Windows 7 PuTTY Cheat Sheets. 697<#_Toc401335405>
SSH KeepAlive to Keep Your Session Active. 700<#_Toc401335406>
Setting Up a Fixed CHROOT to Secure a Linux SSH SFTP Server for File
Transfer Using Public/Private Keys701<#_Toc401335407>
Setting up a Variable CHROOT to Secure a Linux SSH SFTP Server for File
Transfer Using Public/Private Keys711<#_Toc401335408>
Setting up CHROOT Secure Linux SSH Server for SSH Login Using
Public/Private Keys. 715<#_Toc401335409>
Automating the Consolidation of Data on Our SSH Server. 722<#_Toc401335410>
Automating the Encryption and Exchange of Data between Our Partners and
Our SSH Server735<#_Toc401335411>
Enabling Anonymous SSH Connections Using TOR.. 736<#_Toc401335412>
Chapter 10 -- Setting up a Multiboot USB Drive, HAK5 at YouTube Calls it
Your Multipass, One USB Key to Rule Them All.How-to Encrypt and Use a
USB Data Drive from a Multiboot USB Drive!741<#_Toc401335413>
OSs, Tools and Utilities to Install on Your Multipass. 742<#_Toc401335414>
Portable Applications You May Want to Add to Your USB Data Drive.
747<#_Toc401335415>
Setting up a Secure USB Drive and a Bootable USB Drive for Travel.
749<#_Toc401335416>
Chapter 11 -- Before You Are Cracked!There Are Many Preventive Measures
You Can Take to Thwart Identity Theft!754<#_Toc401335417>
Simple Prevention Measures to Save You the Cost of Paid Services.
757<#_Toc401335418>
How bad is Identity Theft?. 759<#_Toc401335419>
Identity Thieves -- Who Are They and How Do They Do It?Could Be Anyone
You Know!760<#_Toc401335420>
Visit Your Local Spy Store, Hidden Cameras, Bug Detection and More.
762<#_Toc401335421>
Detecting Hidden Cameras and Finding Surveillance Bugs. 764<#_Toc401335422>
Invisible Ink--Using and Creating. 767<#_Toc401335423>
Password -- The Weak Link in Securing Information, and Remains as the
Default Method of Authentication769<#_Toc401335424>
Password -- Examples of Corporations Hacked for Their Password Databases
and Your Personal Information771<#_Toc401335425>
Password Management Tools, Rules and Websites. 772<#_Toc401335426>
Password -- Keepass and Password Safe Encrypted Password Databases.
774<#_Toc401335427>
Don't Let Your Tax Return Result in Identity Theft, Cause an Audit
Disaster or Defraud You775<#_Toc401335428>
What to Look for in a U.S. Tax Preparer. 782<#_Toc401335429>
72 Steps You Need to Perform to Protect Your Identity. 783<#_Toc401335430>
Child Identity Theft Information and Prevention.. 802<#_Toc401335431>
Social Security Number Advice. 804<#_Toc401335432>
What to Do if Your Identity Is Stolen.. 804<#_Toc401335433>
Chapter 12 -- All About Smartphones and Why You Should Be Concerned...
808<#_Toc401335434>
The Movies Are Real-Everyone Is Tracking Your Smartphone.
813<#_Toc401335435>
Ex-Partner's Pictures and Data Posted Online, Cellphone Users
Beware!817<#_Toc401335436>
Getting Started with Your Smartphone. 819<#_Toc401335437>
Secure and Protect Your Smartphone. 821<#_Toc401335438>
Extend Your Smartphone's Battery Life. 824<#_Toc401335439>
Turn off Geotagging in Your Smartphone Digital Camera; Don’t Let Them
Track You!824<#_Toc401335440>
What You Need to Know about Cellphone Tracking & Encryption..
825<#_Toc401335441>
You Can Use an SSH Tunnel on Your Android Phone. 827<#_Toc401335442>
About the Author Continued -- This Author's Survival Story in War, from
Cancer, and Life.Never Give Up!Never Surrender!829<#_Toc401335443>
Glossary.. 837<#_Toc401335444>
Appendix 1, Citations.. 843<#_Toc401335445>
Appendix 2:A brief Linux VIM Editor Cheat Sheet.. 844<#_Toc401335446>
On 10/16/2014 3:18 PM, Andrew Spencer wrote:
> Hi,
>
> I have been working as a system administrator for 3 years, but was turned
> into an armadillo. I am now out of a job and I will be moving to New York
> on October 28th in pursuit of becoming a Linux Administrator. I would like
> to find a mentor and or guidance on where to get affordable training. Any
> help or guidance is greatly appreciated from my end.
>
> Warmest Regards,
> Andrew Spencer
> _______________________________________________
> mdlug mailing list
> mdlug at mdlug.org
> http://mdlug.org/mailman/listinfo/mdlug
--
*Kirk Ellis, President and CEO | ThatCyberSecurityGuy LLC*
*kirk at thatcybersecurityguy.com*
*Home/Work/Text/Cell: 734-239-2259*
My 1000 page how-to book is coming January 2015, Our World Needs:"*The
Internet is Infected!The Ultimate Cyber Security Guide for Small
Business & Home Computing*"
Visit my book website at http://thatcybersecurityguy.com.
Visit my blog at http://thatcybersecurityguy.blogspot.com.
Follow me on Twitter http://twitter.com/thatcybersecguy or
@thatcybersecguy <http://twitter.com/thatcybersecguy>.
View all my *unprofessional*, work in progress, bookmark favorites at
http://thatcybersecurityguy.com/favorites.
/Write the first draft with your heart.Re-write with your head.///
From the movie Finding Forrester:As I finish the book this is one of
the most profound statements I have ever heard!
/Demonstrate to the world there is "No Better Friend, No Worse Enemy
than a U.S. Marine."/
General James N. Mattis
/Success is the sum of small efforts, repeated day in and day out./
Robert Collie//
More information about the mdlug
mailing list