How to secure my network - Page 3.1

Find the HOWTO or step-by-step guide that you need right here.

 

Discover How To Secure My Network HOWTOs

How to use your Raspberry Pi as a VPN server

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In 2019, is there anything that the mighty, $35, credit card-sized Raspberry Pi computer can't do? It seems there isn't; recent Raspberry Pi projects include a functional smartphone, a computer vision kit, and even a movie projector for a more traditional home theater experience.

Secure your Linux network with firewall-cmd

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Firewalls are a vital part of network security, so it’s important for a sysadmin to be familiar with how they work. If you understand firewalls, you can keep your network secure by making intelligent choices about the traffic you allow in and out.

Turn a Raspberry Pi 3B+ into a PriTunl VPN

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

PriTunl is a fantastic VPN terminator solution that's perfect for small businesses and individuals who want a quick and simple way to access their network privately. It's open source, and the basic free version is more than enough to get you started and cover most simple use cases.

Learn how to install and configure Nagios on different operating systems

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Learning Nagios 3.0 is a comprehensive configuration guide to monitor and maintain your network and systems. It is a practical guide to setting up the Nagios 3.0 open source network monitoring tool, installing and configuring Nagios 3 on various operating systems. It will help understand system monitoring and how Nagios works. Nagios 3 is a system that watches to see whether hosts and services are working properly, and notifies users when problems occur. Nagios allows both the monitoring of services on its own, and the receipt of information about computer and service statuses from other applications. Nagios constantly checks other machines on your network and various services on those machines. It is a modular and flexible solution that uses plug-ins to do its job.

Need Help writing SNORT Rules for the following I've never done this before

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I need some help in writing snort rules for the following, I have never done this before, can someone please help me. Thanks 1. (1 point) Write a Snort rule that will alert on TCP traffic exiting the 10.0.1.0/24 network with the content "proprietary". I do not care where the traffic is going or what ports it is using. When Snort creates the alert it should read "Proprietary information leaving!" 2. (1 point) Write a Snort rule that will log any TCP traffic entering into the 192.168.100.0/24 and 10.2.2.0/24 networks with destination ports 1 through 1024. I do not care about the source IP addresses or source ports. When Snort logs the traffic it should read "Incoming to low ports". 3. (1 point) Write a Snort rule that will alert on UDP traffic entering the 192.168.10.0/24 network that contains the content "cgi-bin" anywhere between the 5th byte offset to the 25th byte offset. The alert should trigger on both lowercase and uppercase content. I do not care about the source ports or destination ports. When Snort creates the alert it should read "UDP CGI exploit".

Open Source Tool/Month: NMAP for Enterprises

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

So when many people think of Nmap, it is often related to those who are new or learning in the world of scanning and tracking network ports. It's open source. It's easy to use (with a GUI). It has a full community of friendly users, plays well with friends, is good with children and even makes cupcakes at parties (okay maybe not those last few). The point is, the reality may not always be apparent; that Nmap provides some serious, enterprise, #&$#!-kicking functionality. And while we tend to avoid pushing specific papers or How-tos that cost money, this paper we found brought up a nice point considering that Nmap is, in fact, our Open Source Tool of the Month. So if you were curious as to whether Nmap is serious enough to warrant charging for a how-to, (without shame that is) check this out. Could you find this information elsewhere? Probably. Is it as good? We don't know, we didn't buy it :) Is it easier to understand and follow, especially for someone in a business environment? Just maybe. Either way, when push comes to shove, it's nice to see an open source tool get some attention. And who knows? If there's some company manager that doesn't trust Nmap's functionality, maybe a paid analysis of its utility could go farther in convincing them than some free how-to you found online (even from such a trustworthy, experienced site such as this :) Fair is fair, and heck, its food for thought.

FTP Server setup with TLS (Transport Layer Security) on Debian

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you are planning on using FTP and want to use the TLS protocol, here is a simple and effective HowTo on installing it and getting up and running for your system. The TLS protocol allows applications to communicate across a network in a way designed to prevent eavesdropping, tampering, and message forgery. TLS provides endpoint authentication and communications privacy over the Internet using cryptography.

Zabbix: Monitor Your Network

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There are so many network monitoring options for the Open Source user, one might get sick of them. But not likely! Zabbix has the capability to monitor just a about any event on your network from network traffic to how many papers are left in your printer. It produces really cool graphs. In this HowTo we install software that has an agent and a server side. The goal is to end up with a setup that has a nice web interface that you can show off to your boss. It's a great open source tool that lets you know what's out there.

Improving Snort performance with Barnyard

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Do you use Snort? Do you want to get more out of it than you already are? Have no fear, James Turnbull will take you through the process of kicking you Intrusion Detection system up a notch. Check it out: Barnyard improves Snort's speed and efficiency processing outputted data off-loaded by Snort. Barnyard leaves Snort more capacity to perform its key function: scanning and analyzing traffic for anomalies and attacks. We will set Snort to output its alerts and logs to the unified (binary) format, which isn't as processor-intensive as other kinds of output, and then make use of Barnyard to process the resulting output into our required format(s). This tip presumes you already have Snort installed and configured.

Nagios Host and Service Monitoring in 10 Easy Steps

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Ever wanted to set up a robust, manageable and capable network monitoring system? How about one that is free to download? Look no further than Nagios with this HowTo from Rainer Brunold at Novell. With these basic steps you'll be able to pin down movement on your network in no time: Server Preparation Software Download and Extraction Security Preparation Software Compilation and Installation Installation of Plugins Configuration Apache Security Preparation Apache and Nagios Startup Testing and Next Steps Take Nagios for a spin and look out for more of the same soon!

GET MY HUSBANDS MSN PASWORD

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

PLEASE IM BEGGING FOR SUMONES HELP IV BEEN WITH MY HUSBANT 5 YRS I AM ONLY 20 IV GOT TWO BABIES HE HAS MESSED ME AROUND SO MUCH I REALLY NEED SOMEBODYS HELP HE SAID HES CHANGED BUT HE IS ALWAYS CHATING ON THE NET SO I THINK HE IS SEING SOMEONE BEHIND MY BACK ANGAIN SO PLIZ HELP ME OUT IV TRIED SO MANY SITE TO TRY N GET THE PASSWORD BUT HAVNT SUCCEDED IF ANYONE CAN FIND IT OUT FOR ME ND SENDD ME THE PASSWORD I WOULD BE SO GRATEFUL HIS EMAIL IS This email address is being protected from spambots. You need JavaScript enabled to view it. THANKS!!

How to add two-factor authentication to SSH

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

SSH offers a highly secure channel for remote administration of servers. However, if you face an audit for regulatory or business requirements, such as Visa/Mastercard PCI, you need to be aware of some potential authentication related short-comings that may cause headaches in an audit. For example: * There is no way to control which users have public key authorization * There is no way to enforce passphrase complexity (or even be sure that one is being used) * There is no way to expire a public key

Inverse Mapping Via Scapy [ Packet Crafting With Padding]

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This method is quiet useful for inverse mapping the targets for host alive checks.The point will be proved through the scapy via packet crafting.In this we will discuss about inverse mapping with or without padding to compare the results.We know with some tools the response like host unreachable or no response with tool like hping.Lets play with scapy a bit:

Opensource Bandwidth,Network and Servers Monitoring tools with Tutorials

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This is very good tutorials for bandwidth monitoring,network monitoring and servers monitoring tools with clear step by step installation guides this includes Nagios, MRTG, RTG, Netmrg, Darkstat, monit, munin, mon, oreon, Saidar, Cacti, Bigsister, ibmonitor, zabbix. This resource is very useful for Users and Administrators to monitor their networks, bandwidth, and servers.

How Did That Happen? Linux Security Exploits

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The purpose of this book is to provide ways to make it difficult to break in initially as well as to detect the evidence of the attack quickly. But you must not use this book, or any other books, as your only resource of information for this purpose.