Hosting email for virtual domains using Postfix and Cyrus
This document makes a humble attempt in explaining how to get Cyrus to work.
Find the HOWTO or step-by-step guide that you need right here.
This document makes a humble attempt in explaining how to get Cyrus to work.
This documentation discusses a way to scan your system for Rootkits. The information provided is not meant to replace common security practices, but might prove useful when used in conjunction with these practices.
Chrooted system services improve security by limiting damage that someone who broke into the system can possibly do. This article discusses, in depth, how to do so.
This article will cover the issues of Linux hardening, with a specific focus on kernel hardening and its use on production systems. Several kernel-hardening approaches and their usability will be analyzed.
This documentation discusses the use of two TCT tools, unrm and lazarus, on the Sun Solaris operating system, version 2.x. You can use this approach with other UNIX operating systems and hosts.
This documentation will discuss intrusion detection and help you recognize and detect port probes, port scans, denial of service (DoS) attempts and unauthorized access attempts.
This documentation will discuss the U.S. National Security Agency's security-enhanced version of Linux. This documentation takes a first look at this unexpected development -- what it means and what's to come -- and delves into the architecture of SE
SANS has some great information on generating security policies, and a few examples.
This book is intended as a 'self help' guide to computer & network security, primarily for security managers, programmers and system administrators.
This is reportedly the document that started computer security. It discusses intrusions, physical security, threats, policy considerations, and recommendations. Quite good.