How to secure my network - Page 6.75

Find the HOWTO or step-by-step guide that you need right here.

 

Discover How To Secure My Network HOWTOs

Understanding IDS Active Response Mechanisms

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Debates still rage in the developer community over which methods of detecting attackers are best, but IDS customers as a whole are satisfied with the current IDS technology. To get an edge on the competition, many of the IDS vendors are adding active

An Overview of LIDS

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This article is the first part of a four-part series that will offer an overview of LIDS. This installment will offer an introduction to LIDS, including how it works, booting LIDS, sealing the kernel, and configuring LIDS.

Introduction to IPv6

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This documentation discusses the configurations of IP version 6. The goal of this documentation is to get you online with IPv6, giving example configurations for BSD Unix and Linux.

ICMP Usage in Scanning: The Complete Know-How

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This documentation outlines the usage of ICMP protocol in the scanning process. This documentation also, in Step-by-Step process, uncovers each of the malicious computer attacker techniques using the ICMP protocol. A few new scanning techniques will

Through the Tunnel

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this article, we present a few examples on how to use ssh to tunnel data from/to external applications. "VPN (Virtual Private Network) relies on ssh but in a different way, much more elaborate than the one we take up here. Another sophisticated so

Securing Wireless Networks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This documentation will offer an overview of some of the options that are available to enhance the security of wireless networks, including: MAC address filtering, vendor specific authentication, SSID/Network ID, Wired Equivalent Privacy (WEP) and em

IP Spoofing

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This documentation discusses how an attacker can conduct an IP Spoofing attack. A spoofing attack involves forging one's source address. It is the act of using one machine to impersonate another.

Securing OSPF

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This documentation discusses OSPF (Open Shortest Path First), an open standard IP routing protocol. OSPF is a link-state routing protocol. Link-state routing protocols take the actual state of the network link into account when creating routing table

LIDS Hacking HOWTO

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This Document is for LIDS ( Linux Intrusion Detection System) Project and mainly about the impletementation of LIDS in the kernel. The target of the LIDS is to enhance the current Linux Kernel, to make it more solidate and more secure. In order to ac