Linux Learn Tips and Tricks
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Guardian Digital's "Achieving Compliance" white paper will serve as a resource to explain the mandates of Sarbanes-Oxley as it pertains to information technology and to further explain how Guardian Digital, the premier Internet and network security c
This paper explains the importance and implications of open source in education. The open source movement has become more than just a better way of writing software. The open source movement can be seen as a culture, an ideology and a better way for
The honeynet project is a group of security professionals dedicated to learning the tools, tactics, and motives of the blackhat community and sharing those lessons learned. The team collects this information on their own time with their own resources
A good overall summary about how to create ssh1 and ssh2 keypairs. Includes references to other sources.
This HOWTO discusses how to configure IPSec for Linux and connecting to it using the PGPNet VPN client.
This document is intended to be a primer on how to get IPsec on FreeBSD up and running, interoperating both with another FreeBSD (or NetBSD or any other KAME-derived stack) machine, and a Windows 2000 machine.
Black hats use 'passive fingerprinting' to identify your operating system without you knowing it. But the technique is useful for white hats too. This article discusses those techniques used by Blakc/White hats and how you can prevent them.
This article discusses techniques one can use to prevent software Buffer Overflows.
The first but secondary purpose of this article is to introduce you this nifty networking tool: /usr/bin/netcat which is well available from the Debian GNU/Linux under the package name netcat. (The drill: apt-get install netcat and you're done.) Ther
This page details how the chroot() system call can be used to provide an additional layer of security when running untrusted programs. It also details how this additional layer of security can be circumvented.
The purpose of this paper is cover LKM basics, detecting "trojaned" LKM's and figuring out which LKM is installed on your machine.
This documentation discusses the features and security concerns of Sudo (superuser do). Sudo allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root or another user while logging the
The goal of this Perl script is to [thoroughly] just delete the contents of a hard drive.
lsof is a tool to list all the open files on the system. From this information, processes creating network sockets can be found, among other things.
"The Bastille Hardening System attempts to 'harden' or 'tighten' Unix operating systems. It currently supports the Red Hat, Debian, Mandrake, SuSE and TurboLinux Linux distributions along with HP-UX and Mac OS X."
Just as VMware allows us to run a machine within a machine, UML lets us do run multiple, separate, isolated instances of Linux on a single Linux box.
This paper describes step by step how to build a virtual Honeynet using free and OpenSource solutions. If you have ever wanted to work with Honeynet technologies, but could not afford the investment in multiple computers, now is your chance to try i
This HOWTO details creating accounts on a *nix operating system that are chroot'ed to their home directory.
This article outlines the process of reverse engineering hostile code.