Short description: Secret algorithm method for authentification of linux users.(guard bash)
Go on http://www.iprogrammers.ro for more documentations, support and to http://sourceforge.net/projects/squrelayerproxy for DOWNLOAD

Any use of this ? If you need to connect to your computer from outside of your safe environment, even if you use ssh, you are vulnerable to simple attacks like keys sniffing or to more complex attacks against ssh. If you have more than just one authentications method - password based, you could more safely log in your account from an insecure Internet host. The best method ever, I found is to use a secret algorithm (even a simple one) and to change it often. Warning: you have to hack gbash sources for your purpose - but the main idea is there.If you are not a resonable good linux programmer don't dare :)

A simple example:
Display: Secret 0153! Current time is Mon Nov 18 21:17:26 EET 2002
Algorithm is successful if the user inputs 3 characters (digit) from the end of the string starting from sum of the secret number (from 1 + 5 + 3 = 9) - The solution for displayed string is 627.
Adding new algorithms is simple and depends only by your imagination and your memory :) It's also possible to create a program as client side that could assist you in managing and creation of such algorithms and also in helping to solve them - but this is just an idea for future

Implementation and install
The main idea is to create a simple program that will act as a shell wrapper( gbash is the name I will give from now to this program) Before doing anything else, gbash will look in /usr/local/lib/guard/ for a guardlib_user.so and will execute some verification code from this file before executing the normal bash. To make it effective you have to put gbash in the sistem (/usr.local/bin for example). add a line in /etc/shells (/usr/local/bin/gbash), and change the shell for your user to this, using chsh