SELinux with omarine policy: Creating your own rules to add to the security policy

If you want to create your own rules to add to the security policy, read this article to learn how to do through an example. See SELinux with omarine policy: SELinux User Capabilities. We create a module named systemctlstatus to allow systemd services to check the status of other systemd services. Create file systemctlstatus.te (extension […]

How to configure FTP server to support SSL/TLS?

Full documentation to configure FTP server with proftpd is provided at Here we confirm the configuration in practice. In addition to the default configuration in Omarine, you add the configuration directives below. First, load the mod_tls module <IfModule mod_dso.c> LoadModule mod_tls.c </IfModule> Then add the section <IfModule mod_tls.c>. The directives for the configuration have […]

Remote login using ssh in enforcing mode, why enforcing mode is secure?

Accessing with ssh is indispensable for both Cloud Computing and IoT. The general principle is that there is a ssh key pair at the client and the public key will be sent to the remote machine. The following command generates ssh key pair of rsa type with size of 4096 bits: ssh-keygen -t rsa -b […]

How Infrastructure as a Service (IaaS) Meets Blockchain

This Article is Originally Posted on  and written by SARAH ROTHRIE Cloud computing has enabled many companies to outsource much of their IT operations. Doing so eliminates the need for enterprises to run their own servers, software, and databases. Infrastructure is a fundamental need, and these days many organizations leverage cloud computing to outsource all of their IT infrastructure. […]

W. Virginia to Have Blockchain Voting in Midterm Elections

This Article is Originally Posted on   The West Virginia’ Secretary of State’s Office recently announced its plans to roll out a new blockchain-based voting app known as Voatz. According to the secretary of state, the aim of this new voting solution is to ensure that military personnel on duty overseas can vote in the […]

MinerGate CEO Claude Lecomte on Cryptocurrency Mining

This Article is Originally Posted on written by ALEX MOSKOV The computer has come a long way from being a gigantic hunk of a metal and plastic surrounded by groups of curious men and women with clipboards. Fast-forward a few decades, personal computers have become everything from a means to connect to the rest of the […]

SELinux with omarine policy: SELinux User Capabilities

Unlike Linux users where each user has a specific name like tho, emin, SELinux user is a group of users that have the same capabilities in terms of security context. For example, the standard SELinux user is user_u, the administration staff is staff_u. By convention, SELinux user names usually end with _u. The special case, […]

SELinux with omarine policy: Gnome terminal: Fixing the security context

Gnome terminal is GNOME terminal emulator. It works based on Gnome terminal server using dbus. By default, the bus is the system bus, so if you are currently using seuser user_u with the complete context as user_u:user_r:user_t:SystemLow(s0), you will see the Gnome terminal server running in init_t domain with complete context as follows: And the […]

SELinux with omarine policy: Secure login into a security context using ssh

When you run Omarine 5.0 for the first time, the autorelabel service will start. It takes a few minutes (usually 2-3 minutes) to relabel the entire file system. During this initial launch the system will operate in permissive mode. From next time on, the system will run in enforcing mode, which means that the security […]

Cyber security: Unpredictable Random Number Generator

Random Number Generator is an important factor of security activity to create cryptographic keys and passwords. We already know that the rand() function is a simple pseudo-random number generator. It returns a pseudo-random integer in the range 0 to RAND_MAX, ie, the mathematical range [0, RAND_MAX]. You can use rand() to define your own function […]