How to: Secure My Network in Linux - Page 5
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength g
The Linux Intrusion Detection System (LIDS) is a kernel patch and admin tools which enhances the kernel's security by implementing Mandatory Access Control (MAC).
This page collects into one place the essential steps needed to generate a private/public key pair and use ssh to connect to remote hosts without having to enter your password or passphrase more than once per boot of your trusted workstation.
This white paper presents how, when implemented properly, an intrusion detection device can provide a powerful and cost-effective solution that complements a firewall in protecting your corporate assets. The technological advancements include increas
This white paper describes the methods, skills, and tools that hackers use to exploit vulnerabilities in 802.11 wireless LANs. A good understanding of hacker tools and techniques and the vulnerabilities they exploit enables security managers to take
Although a variety of wireless network technologies have or will soon reach the general business market, wireless LANs based on the 802.11 standard are the most likely candidate to become widely prevalent in corporate environments. Current 802.11
IPCop is a cut-down Linux distribution that is intended to operate as a firewall, and only as a firewall. It has some advanced firewalling features, including VPNs using IPSec. This article describes the set-up and use of IPCop, and contains a few co
This documentation will show many methods to batten down the hatches and set up a really secure Linux Network.
This documentation will present the basic tenets of a network security engineering process. It will also show that the network security process, as opposed to a point tool, coincides with the creation of new threats.
This document starts with "What is a network" and goes on to describe the OSI model, risk management, denial of service, authorization, types of firewalls, and more.
This documentations, part 1 of a series of articles, will help you field yourself against the imminent dangers that you will have to face when you decide to open up your business to the anarchy of the Internet. The article goes in depth on the data a
This document, written by Dave Dittrich, provides a great foundation for performing a postmortem on your box once it's been rooted.
VTun provides an easy and simpler way to create virtual tunnels between TCP/IP networks with traffic shaping, compression and encryption. It supports IP, PPP, SLIP, Ethernet and other tunnel types.
Here's a really good article by Steve Bellovin and others from CERT that attempt to provide "risk management" instead of "risk avoidance"
This is a document discusses an interesting perspective on network security and how to develop a sound security strategy.
This is a Sun document that describes what many of the most common TCP and UDP network security vulnerabilities exist, as well as how to reduce their threat.
A one-of-a-kind content-based IDS tool that generates alerts to syslog and/or text files. Comes with more than 1100 attack signatures.
RFC 2267, "Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing" by Paul Ferguson and Daniel Senie details methods for filtering spoofed packets on your network