<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / falko / tag / chroot</title>
<link>http://netvouz.com/falko/tag/chroot?feed=rss</link>
<description>falko&#39;s bookmarks tagged &quot;chroot&quot; on Netvouz</description>
<item><title>Chrooted SFTP With MySecureShell On Debian Etch</title>
<link>http://www.howtoforge.com/mysecureshell_sftp_debian_etch</link>
<description>This tutorial shows how to install MySecureShell on a Debian Etch system. MySecureShell is an SFTP server that is based on OpenSSH and can be configured in many ways, e.g. it has support for chrooting users into their homedirs or for limiting upload-/download bandwidths. MySecureShell makes SFTP available for users that do not have shell access so that these users do not have to use the insecure FTP protocol anymore.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Fri, 21 Sep 2007 08:57:44 GMT</pubDate>
</item><item><title>Chrooted SSH/SFTP On Fedora 7</title>
<link>http://www.howtoforge.com/chroot_ssh_sftp_fedora7</link>
<description>This document describes how to set up a chrooted SSH/SFTP environment on Fedora 7. The chrooted users will be jailed in a specific directory where they cannot break out. They will be able to access their jail via SSH and SFTP.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Wed, 24 Oct 2007 08:51:16 GMT</pubDate>
</item><item><title>Chrooted SSH/SFTP Tutorial (Debian Etch)</title>
<link>http://www.howtoforge.com/chroot_ssh_sftp_debian_etch</link>
<description>This tutorial describes two ways how to give users chrooted SSH access. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of. The users will also be able to use SFTP in their chroot jails.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Sun, 09 Sep 2007 10:01:00 GMT</pubDate>
</item><item><title>Chrooting Apache2 With mod_chroot On Debian Lenny</title>
<link>http://www.howtoforge.com/chrooting-apache2-with-mod_chroot-on-debian-lenny</link>
<description>This guide explains how to set up mod_chroot with Apache2 on a Debian Lenny system. With mod_chroot, you can run Apache2 in a secure chroot environment and make your server less vulnerable to break-in attempts that try to exploit vulnerabilities in Apache2 or your installed web applications.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Thu, 15 Apr 2010 12:21:18 GMT</pubDate>
</item><item><title>Chrooting Apache2 With mod_chroot On Fedora 12</title>
<link>http://www.howtoforge.com/chrooting-apache2-with-mod_chroot-on-fedora-12</link>
<description>This guide explains how to set up mod_chroot with Apache2 on a Fedora 12 system. With mod_chroot, you can run Apache2 in a secure chroot environment and make your server less vulnerable to break-in attempts that try to exploit vulnerabilities in Apache2 or your installed web applications.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Tue, 06 Apr 2010 12:28:40 GMT</pubDate>
</item><item><title>Entering A Safe Mirror When Logging In With Unionfs And Chroot</title>
<link>http://www.howtoforge.com/safe_mirror_unionfs_chroot</link>
<description>When reading a hint on the website of LinuxFromScratch I discovered the special capabilities of unionfs, specially in combination with chroot. Later I read a HowTo on a wikiwebsite of Gentoo, about entering a chrooted home directory when using a special script as shell. Combining these two brings me to using a chrooted environment, which you enter when logging in as a special user. This environment is an exact copy (mirror) of the system you are working on. Because you are in safe copy of the real system, you can do whatever you like, it will never change the system, everything stays inside the cache (the readwrite branch).</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Fri, 29 Jun 2007 10:58:53 GMT</pubDate>
</item><item><title>Restricting Users To SFTP Plus Setting Up Chrooted SSH/SFTP (Debian Squeeze)</title>
<link>http://www.howtoforge.com/restricting-users-to-sftp-plus-setting-up-chrooted-ssh-sftp-debian-squeeze</link>
<description>This tutorial describes how to give users chrooted SSH and/or chrooted SFTP access on Debian Squeeze. With this setup, you can give your users shell access without having to fear that they can see your whole system. Your users will be jailed in a specific directory which they will not be able to break out of. I will also show how to restrict users to SFTP so that they cannot use SSH (this part is independent from the chroot part of this tutorial).</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Tue, 06 Sep 2011 08:01:39 GMT</pubDate>
</item></channel></rss>