How to: Secure My Network in Linux - Page 8

Find the HOWTO or step-by-step guide that you need right here.

Discover How To Secure My Network HOWTOs

Sniffin' the Ether

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This document describes Ethernet sniffing, various tools for doing so, and how it is used to glean passwords from your local subnet.

Secure Shell FAQ

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Secure Shell is a method of logging into a remote host using strong authentication and encryption. It is an excellent telnet and ftp replacement, and should be included in any secure environment.

Understanding TCP/IP

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This Cisco whitepaper discusses the TCP/IP architecture and provides a basic reference model that explains TCP/IP terminology and describes the fundamental concepts underlying the TCP/IP protocol suite. Great document.