<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  
  
  <channel>
    <title>chrisjrob: security</title>
    <link>https://chrisjrob.com</link>
    <atom:link href="https://chrisjrob.com/tag/security/feed/index.xml" rel="self" type="application/rss+xml" />
    <description>GNU Linux, Perl and FLOSS</description>
    <language>en-gb</language>
    <pubDate>Fri, 13 Feb 2026 17:22:31 +0000</pubDate>
    <lastBuildDate>Fri, 13 Feb 2026 17:22:31 +0000</lastBuildDate>
    
    <item>
      <title>Rkhunter /usr/bin/unhide.rb has been replaced by /usr/bin/unhide.rb</title>
      <link>https://chrisjrob.com/2013/07/04/rkhunter-usrbinunhide-rb-has-been-replaced-by-usrbinunhide-rb/</link>
      <pubDate>Thu, 04 Jul 2013 00:00:00 +0000</pubDate>
      <author>chrisjrob@gmail.com (Chris Roberts)</author>
      <guid>https://chrisjrob.com/2013/07/04/rkhunter-usrbinunhide-rb-has-been-replaced-by-usrbinunhide-rb</guid>
      <description>
       <![CDATA[
         
         <p>I have recently moved over to Rootkit Hunter (rkhunter) instead of using
fcheck, one issue that I encountered on all our Ubuntu servers was the
error:</p>

<div class="language-plaintext highlighter-rouge"><div class="highlight"><pre class="highlight"><code>Warning: The command '/usr/bin/unhide.rb' has been replaced by a script: /usr/bin/unhide.rb: Ruby script
</code></pre></div></div>

<!--more-->

<p>Googling confirmed that this error was normal on Ubuntu systems, but I
found no solution. Fortunately the solution was simple, simply editing
<code class="language-plaintext highlighter-rouge">/etc/rkhunter.conf</code> and adding the following line at the appropriate
place:</p>

<div class="language-plaintext highlighter-rouge"><div class="highlight"><pre class="highlight"><code>SCRIPTWHITELIST=/usr/bin/unhide.rb
</code></pre></div></div>

<p> </p>


       ]]>
      </description>
    </item>
    
    <item>
      <title>Howto | Protect against rootkits</title>
      <link>https://chrisjrob.com/2009/03/21/protect-against-rootkits/</link>
      <pubDate>Sat, 21 Mar 2009 06:20:17 +0000</pubDate>
      <author>chrisjrob@gmail.com (Chris Roberts)</author>
      <guid>https://chrisjrob.com/2009/03/21/protect-against-rootkits</guid>
      <description>
       <![CDATA[
         
         <p>Apparently <strong>Rootkits</strong> are a major problem in the linux world.  Unlike viruses, you are much more likely to be infected without realising that you even have a problem.  The purpose of this document is twofold:</p>

<ol>
  <li>Check for existing infection</li>
  <li>Protect against future infection</li>
</ol>

<p>If you are unsure what a Rootkit is, then please read the <a href="https://en.wikipedia.org/wiki/Rootkit">Rootkit Wikipedia page</a> before continuing.</p>

<!--more-->

<h2 id="warning">Warning</h2>

<p><strong>This is how I checked and protected against rootkits and is not how I would recommend that anyone else should do so.</strong></p>

<h2 id="step-1-rkhunter">Step 1: rkhunter</h2>

<p>I suggest you visit the rkhunter website at: http://rkhunter.sourceforge.net/</p>

<div class="language-plaintext highlighter-rouge"><div class="highlight"><pre class="highlight"><code>$ sudo apt-get install rkhunter
$ sudo rkhunter --upgrade
$ sudo rkhunter --checkall --createlogfile
</code></pre></div></div>

<p>Read the output and take corrective action as required.</p>

<h2 id="step-2-chkrootkit">Step 2: chkrootkit</h2>

<p>I suggest you visit the chkrootkit website at:</p>

<ul>
  <li>http://www.chkrootkit.org</li>
</ul>

<p>In particular, <a href="http://www.chkrootkit.org/faq/#9">the FAQS</a> would suggest that you shouldn’t trust the chkrootkit to use the commands on your system, bearing in mind that you suspect that they might be compromised; I chose not to take this additional precaution - you should make your decision based on the exposure of your server to the Internet and your assessment of the likelihood of your having a rootkit.</p>

<div class="language-plaintext highlighter-rouge"><div class="highlight"><pre class="highlight"><code>$ sudo apt-get install chkrootkit
$ sudo chkrootkit
</code></pre></div></div>

<h2 id="step-4-tripwire">Step 4: tripwire</h2>

<ul>
  <li>http://sourceforge.net/projects/tripwire/</li>
</ul>

<p>Tripwire creates a database of your system files and then tracks any changes to them.</p>

<div class="language-plaintext highlighter-rouge"><div class="highlight"><pre class="highlight"><code>$ sudo apt-get install tripwire
</code></pre></div></div>

<p>Follow all the prompts, which will require you to create a Site Key Pass-phrase and a Local key Pass-phrase.  Next we need to create the database:</p>

<div class="language-plaintext highlighter-rouge"><div class="highlight"><pre class="highlight"><code>$ sudo tripwire --init
Wrote database file: /var/lib/tripwire/hostname.domain.com.twd
The database was successfully generated.
</code></pre></div></div>

<p>Next we run a first check:</p>

<div class="language-plaintext highlighter-rouge"><div class="highlight"><pre class="highlight"><code>$ sudo tripwire --check
</code></pre></div></div>

<p>This will doubtless come back with far more information than you really want.  For example I received loads of lines about “/proc/PIDNO/”.</p>

<h2 id="references">References</h2>

<ul>
  <li><a href="http://sourceforge.net/docman/display_doc.php?docid=2078&amp;group_id=3130">Implementing Tripwire</a></li>
  <li><a href="http://www.alwanza.com/howto/linux/tripwire.html">Howto Linux - Tripwire</a></li>
</ul>

<h2 id="a-better-way">A better way</h2>

<ul>
  <li><a href="http://linuxgazette.net/issue98/moen.html">Combining AIDE and Tripwire</a></li>
</ul>


       ]]>
      </description>
    </item>
    
    <item>
      <title>Howto | Protect your Windows PC</title>
      <link>https://chrisjrob.com/2009/03/21/protect-your-windows-pc/</link>
      <pubDate>Sat, 21 Mar 2009 05:34:14 +0000</pubDate>
      <author>chrisjrob@gmail.com (Chris Roberts)</author>
      <guid>https://chrisjrob.com/2009/03/21/protect-your-windows-pc</guid>
      <description>
       <![CDATA[
         
         <p>In my opinion, protecting your Windows PC is much harder than it should be, and for that reason I recommend Linux.</p>

<ul>
  <li><a href="/2009/03/21/why-linux/">Why Linux?</a>.</li>
</ul>

<p>If you are determined to run Windows, then read on!</p>

<!--more-->

<h2 id="secure-your-network">Secure your network</h2>

<p>A <a href="http://www.theregister.co.uk/2008/07/15/unpatched_pc_survival_drops/">recent study</a> found that an unpatched Windows PC connected to the Internet without a firewall, lasted just four minutes.</p>

<h3 id="use-a-hardware-firewall">Use a hardware firewall</h3>

<p>Various studies concluded that so called Personal Firewall software is flawed in concept. Read more about it on Wikipedia, including some of the criticisms:</p>

<ul>
  <li><a href="https://en.wikipedia.org/wiki/Personal_firewall">Personal Firewall</a></li>
</ul>

<p>The good news is that combined modem, router, network switch and Wireless access point can be purchased for less than £50.  Linksys and Draytek have a great reputation, and I personally have had no problems with Netgear.  Just try and get a personal recommendation, and ensure that it does have a built-in firewall.</p>

<h3 id="encrypt-your-wireless">Encrypt your Wireless</h3>

<p>Often people don’t bother encrypting their wireless network.  I believe this is often based on the incorrect assumption that the worst that will happen is that someone will be able to use your broadband for free.  The real reason to encrypt your wireless, is because anyone on your wireless network is inside your network, and can thus browse the file-shares on your computer and potentially exploit your machines.  The fact that they have bypassed your firewall is a big advantage to them.</p>

<p>Avoid WEP encryption, which can be cracked, and instead opt for WPA encryption.</p>

<h2 id="secure-your-pc">Secure your PC</h2>

<h3 id="dont-run-as-administrator">Don’t run as administrator</h3>

<p>Most Windows users run either as “administrator” or with an account that has administrator rights.  This gives any virus that you run full rights to do whatever they want on your PC.  Instead you should run as a limited-user account and only login as administrator when you need to, or use the <a href="http://netsecurity.about.com/od/quicktips/qt/qt_run_as.htm">Run as administrator</a> option.</p>

<p>Read more about this subject:</p>

<ul>
  <li>http://windows.about.com/od/security/a/why_limited.htm</li>
</ul>

<p>If you have teenage children, it is a good idea to create user accounts for them and restrict them to limited-user rights.</p>

<h3 id="keep-your-pc-updated">Keep your PC updated</h3>

<p>You must use the Windows updater to keep your PC updated with critical updates.  If you are running anything older than Windows XP SP2, then consider upgrading, or better still consider changing to Linux.</p>

<ul>
  <li><a href="/2009/03/21/why-linux/">Why Linux?</a></li>
</ul>

<h3 id="install-anti-virus-software">Install anti-virus software</h3>

<p>I would avoid all the free trials that come with a new PC, and I would avoid Norton - which will have devastating effect on your PC.  Instead I would have a look at the following:</p>

<ul>
  <li><a href="http://free.avg.com/">AVG Free Edition</a></li>
  <li><a href="http://www.avast.com/eng/download-avast-home.html">Avast Home Edition</a></li>
  <li><a href="http://www.free-av.com/">AntiVir Personal Edition</a></li>
</ul>

<p><strong>I have only personally tried AVG, but understand that the others are also good.</strong></p>

<h3 id="install-anti-spyware-software">Install anti-spyware software</h3>

<p>Microsoft Defender is now included in Microsoft Vista, and is available for install for Windows XP and this is a logical choice.</p>

<ul>
  <li><a href="http://www.microsoft.com/windows/products/winfamily/defender/default.mspx">Microsoft Defender</a></li>
  <li><a href="http://www.safer-networking.org/">Spybot - Search &amp; Destroy</a></li>
  <li><a href="http://lavasoft.com/">Ad-Aware</a></li>
</ul>

<p><strong>I have personally used all of these programs without issue.</strong></p>

<p>If you have already installed some anti-spyware program, make sure it’s not a rogue:</p>

<ul>
  <li><a href="http://www.spywarewarrior.com/rogue_anti-spyware.htm">Spyware Warrior: Rogue Anti-Spyware</a></li>
</ul>

<h3 id="avoid-internet-explorer">Avoid Internet Explorer</h3>

<p>Use Mozilla Firefox instead of Internet Explorer.  Only use Internet Explorer for those sites that you trust implicitly.</p>

<h2 id="be-cautious">Be cautious</h2>

<ul>
  <li>Do not open email attachments unless you know the sender and are expecting the attachment</li>
  <li>Do not click on hyperlinks in emails (they’re as dangerous as attachments)</li>
  <li>Do not visit dubious websites</li>
  <li>Never follow links in pop-ups</li>
  <li>Delete any chain e-mails or unwanted messages without forwarding</li>
  <li>Don’t reply to junk emails, nor follow links to remove yourself from their database, often all you are doing is confirming that your email address is valid</li>
  <li>When installing software, read every step thoroughly to ensure that you do not install additional software without realising it</li>
</ul>

<h2 id="further-reading">Further Reading</h2>

<ul>
  <li><a href="/2009/03/21/why-linux/">Why Linux?</a></li>
  <li><a href="http://www.sans.org/rr/papers/index.php?id=1298">Windows XP - Surviving the first day</a></li>
</ul>

       ]]>
      </description>
    </item>
    
  </channel> 
</rss>
