Linux Learn Tips and Tricks - Page 14

Find the HOWTO or step-by-step guide that you need right here.

 

Discover How To Learn Tips And Tricks HOWTOs

Installing Fedora 3

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For the Linux novice, installing a new build can be a daunting task. This chapter will help you figure out what you need and what you don't. Even Linux pros will find some tips on configuring a build that can help enhance security.

OWASP Guide

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Guide forms the basis for corporate web security policies for several Fortune 500 companies and is used in service offerings from many security consulting companies.

SQL Injection Attacks by Example

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There have been other papers on SQL injection, including some that are much more detailed, but this one shows the rationale of discovery as much as the process of exploitation.

CISSP Open Study Guide

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The CISSP Open Study Guide web site is a site dedicated to helping CISSP (certified information system security professionnals) student in their quest to become certified.

Are You Ready for Sarbanes-Oxley Compliance?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Guardian Digital's "Achieving Compliance" white paper will serve as a resource to explain the mandates of Sarbanes-Oxley as it pertains to information technology and to further explain how Guardian Digital, the premier Internet and network security c

The Honeynet Project

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The honeynet project is a group of security professionals dedicated to learning the tools, tactics, and motives of the blackhat community and sharing those lessons learned. The team collects this information on their own time with their own resources

FreeBSD IPSec HOWTO

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This document is intended to be a primer on how to get IPsec on FreeBSD up and running, interoperating both with another FreeBSD (or NetBSD or any other KAME-derived stack) machine, and a Windows 2000 machine.

Passive Aggressive

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Black hats use 'passive fingerprinting' to identify your operating system without you knowing it. But the technique is useful for white hats too. This article discusses those techniques used by Blakc/White hats and how you can prevent them.

Play with the Lovely Netcat: Reinvent /usr/bin/yes

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The first but secondary purpose of this article is to introduce you this nifty networking tool: /usr/bin/netcat which is well available from the Debian GNU/Linux under the package name netcat. (The drill: apt-get install netcat and you're done.) Ther

How to break out of a chroot() jail

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This page details how the chroot() system call can be used to provide an additional layer of security when running untrusted programs. It also details how this additional layer of security can be circumvented.

Psudo root!

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This documentation discusses the features and security concerns of Sudo (superuser do). Sudo allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root or another user while logging the