How to: Secure My Network in Linux - Page 4
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
SSH offers a highly secure channel for remote administration of servers. However, if you face an audit for regulatory or business requirements, such as Visa/Mastercard PCI, you need to be aware of some potential authentication related short-comings that may cause headaches in an audit. For example: * There is no way to control which users have public key authorization * There is no way to enforce passphrase complexity (or even be sure that one is being used) * There is no way to expire a public key
This method is quiet useful for inverse mapping the targets for host alive checks.The point will be proved through the scapy via packet crafting.In this we will discuss about inverse mapping with or without padding to compare the results.We know with some tools the response like host unreachable or no response with tool like hping.Lets play with scapy a bit:
This is very good tutorials for bandwidth monitoring,network monitoring and servers monitoring tools with clear step by step installation guides this includes Nagios, MRTG, RTG, Netmrg, Darkstat, monit, munin, mon, oreon, Saidar, Cacti, Bigsister, ibmonitor, zabbix. This resource is very useful for Users and Administrators to monitor their networks, bandwidth, and servers.
The purpose of this book is to provide ways to make it difficult to break in initially as well as to detect the evidence of the attack quickly. But you must not use this book, or any other books, as your only resource of information for this purpose.
This paper will show how to use basic Linux scripting to create a reusable network security monitor that is easy to use and easy to maintain.
This paper presents a detailed implementation and operation plan for remote configuration management of a research network infrastructure.
This document is an introduction to system administration of a Linux system for novices.
This article provides an overview of LDP, including LDP components and operations that are related to pseudowire emulation over MPLS along with an explanation of the control signaling and data switching details of AToM.
This HOWTO shows an easier and cheaper way to securely access remote networks for a small business or an individual.
This document describes the software and procedures to set up and use IEEE 802.1X Port-Based Network Access Control using Xsupplicant as Supplicant with FreeRADIUS as a back-end Authentication Server.
A very hands-on approach to iproute2, traffic shaping and a bit of netfilter.
This is a cookbook recipe on how to set up and run IP aliasing on a Linux box and how to set up the machine to receive e-mail on the aliased IP addresses.
IptablesWeb is a free software (under GPL licence): it makes possible to inspect iptables logs by using a web browser. It's a plugin-based multilanguage software written in PHP using 3 free php classes.
Break through the complexity of SE Linux with a working example that shows how to add SE Linux protection to a simple network server.
This document outlines suggested steps for determining if your system has been compromised.
This document provides a general overview of attacks in which the primary goal of the attack is to deny the victim(s) access to a particular resource.
If your site isn't filtering certain TCP/IP packets, it may not be as secure as you think.
This article should explain how to setup and configure a VPN using CIPE. CIPE may not be standard like IPSec, but it sure is a hell of a lot simpler.
OpenVPN is a full-featured SSL VPN solution which can accomodate a wide range of configurations, including road warrior access, home/office/campus telecommuting, WiFi security, secure branch office linking, and enterprise-scale remote access solution