How to: Secure My Network in Linux - Page 6

Find the HOWTO or step-by-step guide that you need right here.

Discover How To Secure My Network HOWTOs

Secure Shell

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

SSH is a powerful, yet easy-to-use application that uses strong cryptography for protecting all transmitted confidential data, including passwords, binary files, and administrative commands.

FreeS/WAN IPSEC HOWTO

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

FreeS/WAN is a Linux implementation of the IPSEC (IP security) protocols. IPSEC provides encryption and authentication services at the IP (Internet Protocol) level of the network protocol stack.

Home Network Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This CERT document gives home users an overview of the security risks and countermeasures associated with Internet connectivity, especially in the context of 'always-on' or broadband access services (such as cable modems and DSL).

Bandwidth Limiting HOWTO

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This document describes how to set up your Linux server to limit download bandwidth or incoming traffic and how to use your internet link more efficiently. This is useful when our internet link is slow or our LAN users download tons of mp3s and the n

Secure Passwordless Logins with SSH, Part 1-3

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Many of my past newsletters have detailed configuration setups that required you to be able to execute commands on remote machines without interactively supplying a password. The next few articles will help show how you can set up such a system.

The Unix Auditors Practical Handbook

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This handbook is meant to be a practical guide to auditing Unix. It will be kept as up-to-date as possible. The commands and filenames given here are applicable to a Sun Solaris system. However, there are cross-command references for AIX and Linux.

Understanding IDS Active Response Mechanisms

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Debates still rage in the developer community over which methods of detecting attackers are best, but IDS customers as a whole are satisfied with the current IDS technology. To get an edge on the competition, many of the IDS vendors are adding active