ClearOS: Linux Server for Small Business
ClearOS (formerly ClarkConnect) is a Linux distribution, with the aim of transforming any standard PC into a dedicated firewall and Internet server / gateway. The software is a solution for small businesses, home offices and networked homes. ClearOS is based on CentOS and offers a very robust set of tools organized in easy to navigate administration pages.
Small business and servers
Small business data centers often rely on one-size-fits-all solutions for standard problems. Because’? They save on costs. Within the Linux world, there are a number of exceptional server software that can help power a business in ways that aren’t always considered.
The problem with small businesses that use Linux can often come in the form of distribution complexity. While Linux has come a long way in terms of ease of use, there can sometimes be an additional level of complexity when it comes to server software. This additional learning curve is very often easily overcome by anyone with a moderate level of computer skills. Note that for anyone who has used Linux before, this is generally a breeze.
But then, who needs a data center solution, without the burden of a high-level IT expert on hand, who could they turn to? One solution is ClearOS.
What is ClearOS
According to the presentation material of the distribution:
“ClearOS is a simple, open and affordable operating system, with an intuitive web-based graphical user interface and a marketplace with over 100 applications to choose from, with more being added every day. By leveraging open source software, you decide which apps you need and only pay for the apps and support you want. “
To verify that these statements respect reality and check that ClearOS is indeed an interesting solution, let’s see the details together.
First, you need to choose between the versions of the operating system. In fact, ClearOS offers three different platform distributions:
– Community: the free edition of ClearOS
– Home: Ideal for home offices
– Business: Ideal for small businesses, thanks to the inclusion of paid support
To find out the differences of each edition, you can consult the ClearOS function matrix here. There are also the prices on the page which, after all, are contained for the proposed service.
There is really no need to talk about the ClearOS installation process, as it is incredibly simple. If you’ve ever installed Linux, you won’t have any problems with ClearOS.
I wanted to test it with a VirtualBox on my personal computer, and in just 20 minutes I had a working virtual machine with ClearOS ready. The installation time includes the post-installation wizard and the first updates.
Once you have completed the basic installation, post-installation wizard and updates, all done from within an incredibly well-designed web interface, you are ready to start adding applications from the ClearOS Marketplace, which is ‘where the platform really shines.
Taking a look at the process of adding applications to the ClearOS server, it is evident how easy this ecosystem is to use. Once we are done with the initial setup, we are on the “ClearOS Marketplace Getting Started” page. From this screen it is possible to manage the application selection and installation process.
The operating system also comes with a couple of preconfigurations to choose from. In any case, you will have the possibility to choose through the selection of applications / services to be installed on the ClearOS server.
Available features include:
– Firewall, Networking and Security:
– Network: the firewall restricts access to systems and provides advanced features, including DMZ, NAT 1 to 1 and Port Forwarding
– Protocol: Peer-to-Peer discovery system allows you to manage the use of peer-to-peer file sharing
– Application: Intrusion Detection and Intrusion Prevention systems provide an additional layer of defense against threats to your network.
– Virtual Private Networking
– Web Proxy and Content Filter
– Email, including Webmail
– Database and Web Server
– File and print services
Some of the apps are free, while others have a cost. You have to consult the list of available apps to see if any of these apps / services meet your needs and fit your budget. Once you have selected all the applications you want to install, you can proceed with the installation.
At this point you are ready to configure the custom dashboard. If you don’t want to worry about customizing the dashboard, you can use the default one. The dashboard allows you to select what you want to view through practical drop-down menus. It is also possible to immediately start configuring newly installed applications.
One remarkable thing is that ClearOS has made configuring the LDAP service extremely easy. Normally this process can be quite a headache, but ClearOS has found a way to make it as painless as possible.
The function of ClearOS
One thing not found on ClearOS is a tool for creating a server environment like that of a Microsoft Small Business Server or its successor Windows Server. So, using applications like MS Office, via Terminal Server, will not work. But you can always install the Dropbox app for free and use their Paper Server. This, of course, is not a real alternative for a full office suite, but it is still a partial solution.
However, this is not the point of ClearOS, as the intent is more to serve a business-class server that can help protect and expand a small business network. In other words, if you are looking for an incredibly simple firewall to set up and manage, VPN, DNS, DHCP, and a well-rounded general network appliance, ClearOS is exactly what you need. If you are looking for something to replace a Samba server, ClearOS is not the solution.
ClearOS can be found among the standard SOD templates and you can then install your own VPS with ClearOS in a few seconds.
- Examples of phishing: the latest campaigns mentioned by the CSIRT
- Event Overload? Our SOCaaS can help!
- Business email compromise (BEC) schemes
- XDR as an approach to security
- What is threat intelligence?
- Data Loss Prevention: definition and uses
- Prevent shoulder surfing and theft of corporate credentials
- HTTP / 3, everything you need to know about the latest version protocol
- Backup as a Service (2)
- Cloud Conference (3)
- Cloud CRM (1)
- Cloud Server/VPS (20)
- Conferenza Cloud (4)
- ICT Monitoring (4)
- Log Management (2)
- News (17)
- ownCloud (4)
- Privacy (6)
- Secure Online Desktop (14)
- Security (10)
- Web Hosting (15)
- Latest Security News From RSAC 2021 May 17, 2021Check out Dark Reading's updated, exclusive coverage of the news and security themes that are dominating RSA Conference 2021.
- DarkSide Ransomware Variant Targets Disk Partitions May 17, 2021A newly discovered DarkSide ransomware variant can detect and compromise partitioned hard drives, researchers report.
- 47% of Criminals Buying Exploits Target Microsoft Products May 17, 2021Researchers examine English- and Russian-language underground exploits to track how exploits are advertised and sold.
- DDoS Attacks Up 31% in Q1 2021: Report May 17, 2021If pace continues, DDoS attack activity could surpass last year's 10-million attack threshold.
- Rapid7 Is the Latest Victim of a Software Supply Chain Breach May 17, 2021Security vendor says attackers accessed some of its source code using a previously compromised Bash Uploader script from Codecov.
- RSAC 2021: What Will SolarWinds' CEO Reveal? May 17, 2021In a keynote conversation with Forrester analyst Laura Koetzle, Sudhakar Ramakrishna will get candid about the historic breach.
- Agility Broke AppSec. Now It's Going to Fix It. May 17, 2021Outnumbered 100 to 1 by developers, AppSec needs a new model of agility to catch up and protect everything that needs to be secured.
- Name That Toon: Road Trip May 17, 2021Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
- Rapid7 Source Code Accessed in Supply Chain Attack May 14, 2021An investigation of the Codecov attack revealed intruders accessed Rapid7 source code repositories containing internal credentials and alert-related data.
- How Faster COVID-19 Research Is Being Made Possible by Secure Silicon May 14, 2021When Intel and Leidos set up a "trusted execution environment" to enable a widespread group of researchers to securely share and confidentially compute real-world data, it was no small achievement.
- Backdoor.Win32.Delf.zho / Authentication Bypass RCE May 14, 2021Posted by malvuln on May 13Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/6b9f5a0512af3ab33c26eaa4bdf94f1f.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Delf.zho Vulnerability: Authentication Bypass RCE Description: The malware listens on TCP port 21 and TCP ports 14920 to 14923. Third-party attackers who can reach the system can logon using any username/password […]
- [CFP]: 2nd Joint Workshop on CPS&IoT Security and Privacy (CPSIoTSec 2021) May 14, 2021Posted by Call For Papers CPSIOTSEC21 on May 13--------------------------------------------------------------------------------------------------------------- C a l l F o r P a p e r s 2nd Joint Workshop on CPS&IoT Security and Privacy (CPSIoTSec 2021) Seoul, South Korea, November 15 (Monday), 2021 URL: https://cpsiotsec.github.io co-located with the ACM Conference on Computer and Communications Security (ACM CCS 2021)...
- Trovent Security Advisory 2103-02 / Multiple XSS vulnerabilities in ERPNext 13.0.0/12.18.0 May 11, 2021Posted by Stefan Pietsch on May 11# Trovent Security Advisory 2103-02 # ##################################### Multiple XSS vulnerabilities in ERPNext 13.0.0/12.18.0 ###################################################### Overview ######## Advisory ID: TRSA-2103-02 Advisory version: 1.0 Advisory status: Public Advisory URL: https://trovent.io/security-advisory-2103-02 Affected product: ERPNext Tested versions: 12.18.0 and 13.0.0 beta Vendor: Frappé Technologies...
- Trovent Security Advisory 2103-01 / Authenticated SQL injection in ERPNext 13.0.0/12.18.0 May 11, 2021Posted by Stefan Pietsch on May 11# Trovent Security Advisory 2103-01 # ##################################### Authenticated SQL injection in ERPNext 13.0.0/12.18.0 ##################################################### Overview ######## Advisory ID: TRSA-2103-01 Advisory version: 1.0 Advisory status: Public Advisory URL: https://trovent.io/security-advisory-2103-01 Affected product: ERPNext Tested versions: 12.18.0 and 13.0.0 beta Vendor: Frappé Technologies https://frappe.io...
- CVE-2021-32051 Hexagon G!nius Auskunftsportal before 220.127.116.11 allows SQL injection via the GiPWorkflow/Service/DownloadPublicFile id parameter. May 11, 2021Posted by Marcel Keiffenheim on May 11
- Backdoor.Win32.Antilam.13.a / Unauthenticated Remote Command Execution May 11, 2021Posted by malvuln on May 11Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/1ef711b34cc278449f1997e4ed06334a.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Antilam.13.a Vulnerability: Unauthenticated Remote Command Execution Description: The malware drops an executable named "scandisk.exe" that listens on TCP ports 47891 and 29559. Third party attackers who can reach infected...
- Backdoor.Win32.MotivFTP.12 / Authentication Bypass RCE May 11, 2021Posted by malvuln on May 11Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/88785a093b8fa00893214dd220ac255d.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.MotivFTP.12 Vulnerability: Authentication Bypass RCE Description: The malware listens on TCP port 21. Third-party attackers who can reach the system can logon using any username/password combination. Attackers may then upload...
- Re: Three vulnerabilities found in MikroTik's RouterOS May 11, 2021Posted by Gynvael Coldwind on May 11Got it! Thank you for the explanation!
- Four vulnerabilities found in MikroTik's RouterOS May 11, 2021Posted by Q C on May 11Advisory: four vulnerabilities found in MikroTik's RouterOS Details ======= Product: MikroTik's RouterOS Vendor URL: https://mikrotik.com/ Vendor Status: only CVE-2020-20227 is fixed CVE: CVE-2020-20220, CVE-2020-20227, CVE-2020-20245, CVE-2020-20246 Credit: Qian Chen(@cq674350529) of Qihoo 360 Nirvan Team Product Description ================== RouterOS is the operating system used on the MikroTik's devices, such as […]
- Re: Three vulnerabilities found in MikroTik's RouterOS May 11, 2021Posted by Q C on May 11Hi, In Mikrotik RouterOs, each user is assigned to a user group, which denotes the rights of this user. A group policy is a combination of individual policy items, and provides a convenient way to assign different permissions and access rights to different user classes. (Reference: https://help.mikrotik.com/docs/display/ROS/User) Some common […]
Tempo di lettura: 4 minIntroduzioneAlla luce del crescente numero di attacchi ransomware in cui i cryptolocker inte… https://t.co/ubv6OcMrVW
Estimated reading time: 5 minutes Cyber Threat Hunting is a proactive security search across networks, endpoin… https://t.co/afEZYKrnAK
Estimated reading time: 5 minutes A Zero-Day attack (also known as 0-day) exploits a software vulnerability unkno… https://t.co/tdRF7a7zOa
Tempo di lettura: 4 minAttraverso il servizio di cloud storage ownCloud puoi collaborare con i tuoi colleghi ai con… https://t.co/gLk003kzxV
A common definition of data exfiltration is the theft, removal, or unauthorized movement of any data from a device.… https://t.co/cuUyQtUoah