Sponsored Content
Special Forums Cybersecurity Live Virtual Box Secure Browsing Post 302606313 by bambuntu on Saturday 10th of March 2012 03:04:34 PM
Old 03-10-2012
Live Virtual Box Secure Browsing

I'm working on Linux Surfer - Code Name: Annabelle Lee, A live distro made for secure web surfing. One of the solutions a user has at their immediate arsenal with Linux Surfer is a virtual machine with one click that popus up SliTaz. They can then surf the web without sniffing attack from the Linux X server. But, like every Live Linux distro I know, the user is root or has root access.

Does anyone know of a relatively easy distro to remaster where that distro is also lightweight? I need to remaster it so the user signed in does not have root priveldges in order to protect the user in Linux Surfer.

If you are curious about what I've done so far,here is a torrent and description of my iso to date:

Ok, I dont have five posts, so you can find it with Google with these terms:

Quote:
linux surfer code name Annabelle Lee 0.1 Demonoid
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

how can i secure the unix box?

i am new to the unix i am running solaris 9 i like it better than windows... anyway i am looking on how can i secure the box in terms of software any freedownloads would be a plus as well.... also what commands will be useful to see if there has been a security breech on the unix box? ... (1 Reply)
Discussion started by: rmuhammad
1 Replies

2. Solaris

virtual box images

Does anyone know if you can use a virtual box image on different O/S's and be able to move it from one server to another of different O/S if needed? (1 Reply)
Discussion started by: BG_JrAdmin
1 Replies

3. Windows & DOS: Issues & Discussions

Virtual Box

I am trying to create a new virtual machine (Red Hat) but I am getting the following error I am completely new to VB and I am probably missing something. Any help will be greatly appreciated. (4 Replies)
Discussion started by: Xterra
4 Replies

4. Virtualization and Cloud Computing

Installing CentOS 5.5 on Virtual Box

Hi, I have installed VirtualBox, downloaded CentOS 5.5 and created a VirtualMachine where i have installed the 'server' versión of CentOS 5.5 As I installed Virtual Box a new network device appeared '192.16.1.250' in my 'real' machine. I was unable to reach my webserver so i istalled CentOS once... (5 Replies)
Discussion started by: motoko
5 Replies

5. Solaris

how to connect to wireless from virtual box

hi everyone... this is my first post here please help me with this..as iam new to solaris i have installed solaris 10 on virtual box.. and am not able to connect to the internet .. is there anyway i can get connect to the net.. please help me step by step if possible... thanks in... (1 Reply)
Discussion started by: yrajendergoud
1 Replies

6. UNIX for Dummies Questions & Answers

Sun Virtual box

hi Am Using Windows vista machine where i installed Sun Virtual Box on Which i installled Solaris 10.. am not able to ping my windows machine from Sun OS neither viceversa.. Can someone help me out to get this sorted please .... (2 Replies)
Discussion started by: Sojourner
2 Replies

7. Virtualization and Cloud Computing

problems with Installation of virtual box

I am Trying to install Oracle virtual box.But it is giving me some error message.Unable to resolve dependencies for some packages selected for installation.Missing dependencies libSDL-1.2.so.0 is needed by pacakage virtual box 4.1 I am using RHEL5 Help out with this. (1 Reply)
Discussion started by: saisrinivas99
1 Replies

8. Solaris

Change hostID of Solaris 10 virtual/guest machine installed by Virtual Box 4.1.12 on Windows-XP host

Trying to set or modify the randomly set hostID of a Solaris 10 virtual/guest machine that I installed on a Windows-XP host machine (using Virtual Box 4.1.12). I was able to set/modify the hostname of the Solaris 10 virtual/guest machine during installation as well as via the Virtual Box... (4 Replies)
Discussion started by: Matt_VB
4 Replies

9. IP Networking

ssh on virtual box (4.0.4)

Hello, I have two virtual machines ubuntu on virtual box vm1 and vm2 , i'd like to use ssh to connect from vm1 to vm2, please what's the configuration should do? Thank you (1 Reply)
Discussion started by: chercheur857
1 Replies
PAM_SECURETTY(8)						 Linux-PAM Manual						  PAM_SECURETTY(8)

NAME
pam_securetty - Limit root login to special devices SYNOPSIS
pam_securetty.so [debug] DESCRIPTION
pam_securetty is a PAM module that allows root logins only if the user is logging in on a "secure" tty, as defined by the listing in /etc/securetty. pam_securetty also checks to make sure that /etc/securetty is a plain file and not world writable. It will also allow root logins on the tty specified with console= switch on the kernel command line and on ttys from the /sys/class/tty/console/active. This module has no effect on non-root users and requires that the application fills in the PAM_TTY item correctly. For canonical usage, should be listed as a required authentication method before any sufficient authentication methods. OPTIONS
debug Print debug information. noconsole Do not automatically allow root logins on the kernel console device, as specified on the kernel command line or by the sys file, if it is not also specified in the /etc/securetty file. MODULE TYPES PROVIDED
Only the auth module type is provided. RETURN VALUES
PAM_SUCCESS The user is allowed to continue authentication. Either the user is not root, or the root user is trying to log in on an acceptable device. PAM_AUTH_ERR Authentication is rejected. Either root is attempting to log in via an unacceptable device, or the /etc/securetty file is world writable or not a normal file. PAM_INCOMPLETE An application error occurred. pam_securetty was not able to get information it required from the application that called it. PAM_SERVICE_ERR An error occurred while the module was determining the user's name or tty, or the module could not open /etc/securetty. PAM_USER_UNKNOWN The module could not find the user name in the /etc/passwd file to verify whether the user had a UID of 0. Therefore, the results of running this module are ignored. EXAMPLES
auth required pam_securetty.so auth required pam_unix.so SEE ALSO
securetty(5), pam.conf(5), pam.d(5), pam(7) AUTHOR
pam_securetty was written by Elliot Lee <sopwith@cuc.edu>. Linux-PAM Manual 09/19/2013 PAM_SECURETTY(8)
All times are GMT -4. The time now is 11:17 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy