Mon, 26 Mar 2012
The BASICS of Securing your computer and E-mail.
There are times when you need to get items through the mail. This poses a security risk as a valid address must be given to receive the items you want. This file is intended to provide you with an understanding of how to set up Postal delivery points that are difficult if not impossible to trace. As with any security you implement there is a trade off. You are trading reliability and quickness of delivery for security.
Well, We have discussed the encrypted container files, and you have your ssh and gpg keys secured. Now to take the authentication one step further.
When you authenticate to your system you have to type a login and a password. This is ok but we can improve this. Linux uses PAM (Pluggable Authentication Modules) to set the authentication requirements for the system. We can extend this one step further and greate a OTP (One Time Pad) on a USB key that is then required to be present before you can login. This means that you will need your login, your password, and a special USB key plugged into a USB port on the system to log in.