How to: Secure My Network in Linux - Page 8
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
This document describes Ethernet sniffing, various tools for doing so, and how it is used to glean passwords from your local subnet.
The Secure Shell is a method of logging into a remote host using strong authentication and encryption. It is an excellent telnet and ftp replacement, and should be included in any secure environment.
This Cisco whitepaper discusses the TCP/IP architecture and provides a basic reference model that explains TCP/IP terminology and describes the fundamental concepts underlying the TCP/IP protocol suite. Great document.