How to: Harden My Filesystem in Linux - Page 5
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Ettercap is a suite for man in the middle attacks on LAN. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols (even ciphered ones) and
Organizations throughout the world are adopting Linux as their production platform. By connecting to the Internet to provide critical services, they also become targets of opportunity. To help protect these Linux systems, this article covers the basi
BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
CASPR stands for Commonly Accepted Security Practices & Recommendations. Our goal is to distill the knowledge of the world’s Information Security experts into a series of papers that are freely available on the Internet to everyone.
AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.
AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire.
Afick is a security tool, very close from the well known tripwire. It allows to monitor the changes on your files systems, and so can detect intrusions.
The Community Edition of EnGarde Secure Linux was designed to support features suitable for individuals, students, security enthusia
This patch is a collection of security-related features for the Linux kernel, all configurable via the new 'Security options' configuration section. In addition to the new features, some versions of the patch contain various security fixes. The numbe
The Linux Security Audit Project (LSAP) was created to help coordinate and discuss the security and auditing of the free software available.
This version of Linux has a strong, flexible mandatory access control architecture incorporated into the major subsystems of the kernel. The system provides a mechanism to enforce the separation of information based on confidentiality and integrity
This white paper focuses on the need to establish a multi-layered defense against email security threats and to erect a defense that is constantly updated to meet these ever-changing threats. A managed service provider can provide a strong level of d
As more and more business processes move online, many enterprises are evaluating stronger security than that provided by traditional passwords. However, the decision to replace embedded password security solutions with stronger authentication is a co
Linux, with its flexibility, scalability and cost savings, can help overcome the obstacles and yield lasting infrastructure improvements. In building for the future, Linux is an architect’s dream: It is reliable, adaptable, cost-effective and open.
Information systems security continues to be a primary concern to business managers. Compromised data or business systems, whether from external sources or internal, can introduce enormous costs—competitively, operationally and financially. The mat
Linux is ideally suited as an enterprise-class operating system for many reasons. One is its reliability. Linux systems offer mainframe-class stability with reported system uptimes of a year or more. Google, one of the Internet’s foremost search en
The Starter PKI program from Thawte has been developed for companies with a need to secure multiple domains or host names. This guide will introduce you to the Program by explaining how it works and its benefits. We will also point you to a dummy com
The phrase "thinking outside the box" is often used to describe the creative process of coming up with a unique idea or process outside the norm. In this white paper, we use the phrase "thinking inside the box" to describe the benefits of an applianc
With the risks associated with e-commerce and online communication, it is important to use secure encryption technology when conducting online business to build trust. To build that trust, you need to be authenticated by a trusted third party and rec
Guardian Digital provides datasheets for various product and service offerings.