How to: Secure My Network in Linux - Page 7
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Debates still rage in the developer community over which methods of detecting attackers are best, but IDS customers as a whole are satisfied with the current IDS technology. To get an edge on the competition, many of the IDS vendors are adding active
This document provides information on how to setup a transparent caching HTTP proxy server using only Linux and squid.
This article is the first part of a four-part series that will offer an overview of LIDS. This installment will offer an introduction to LIDS, including how it works, booting LIDS, sealing the kernel, and configuring LIDS.
This documentation is the second of a two-part series that will offer an overview of network-based intrusion detection and false reports. This installment will offer a brief overview of NIDS devices and will examine how and why false reports take pla
This documentation discusses how one can correctly creat a network security policy. This document is divided into three areas: preparation, prevention, and response.
This documentation is an aid for the sysadmin or security admin to implement along their networks for better protection.
This documentation discusses the configurations of IP version 6. The goal of this documentation is to get you online with IPv6, giving example configurations for BSD Unix and Linux.
This documentation outlines the usage of ICMP protocol in the scanning process. This documentation also, in Step-by-Step process, uncovers each of the malicious computer attacker techniques using the ICMP protocol. A few new scanning techniques will
In this article, we present a few examples on how to use ssh to tunnel data from/to external applications. "VPN (Virtual Private Network) relies on ssh but in a different way, much more elaborate than the one we take up here. Another sophisticated so
This documentation will explain the performance-testing methodology used to test IDS (Intrusion Detection Systems).
This documentation will offer an overview of some of the options that are available to enhance the security of wireless networks, including: MAC address filtering, vendor specific authentication, SSID/Network ID, Wired Equivalent Privacy (WEP) and em
This documentation discusses the five access points that need to be protected for you to minimize an attacker's entry to each identified access point in the network.
This documentation will be introducing you to the whole concept surrounding the working of TCP Wrappers.
This documentation discusses how an attacker can conduct an IP Spoofing attack. A spoofing attack involves forging one's source address. It is the act of using one machine to impersonate another.
This documentation sets out suggested steps for responding to a UNIX or NT system compromise.
This documentation will look at the dominant standard for virtual private networks, IPsec. You will also see what is there, what is not, and you will be given recommendations as to what to do.
This documentation discusses OSPF (Open Shortest Path First), an open standard IP routing protocol. OSPF is a link-state routing protocol. Link-state routing protocols take the actual state of the network link into account when creating routing table
This Document is for LIDS ( Linux Intrusion Detection System) Project and mainly about the impletementation of LIDS in the kernel. The target of the LIDS is to enhance the current Linux Kernel, to make it more solidate and more secure. In order to ac
This documentation examines how SSL works, what it can do, and how the products and applications that use SSL have failed, resulting in updates to Netscape Navigator and Microsoft's Internet Explorer and IIS this year.
This documentation is a large collection of DDoS related tools, papers, essays, analyses, news reports, and interviews.