How to secure my network - Page 2.5
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Learn about TCP wrappers and how they can be used to secure network services running on a Linux server in this tutorial.
Whether you are troubleshooting a network issue or verifying the security of your network, monitoring network activity is crucial to maintaining a secure Linux system. Learn about multiple great methods for monitoring network activity on a Linux system in this LinuxConfig tutorial.
Nmap is an awesome open-source network discovery and reconnaissance tool that can be used to improve network security by revealing detailed information about target hosts and identifying potential vulnerabilities. Learn about 20 helpful nmap commands in this LinuxTechi guide.
Learn how to secure your work-from-home network and protect your privacy in eight simple steps.
Ncat is essential for Linux network debugging and troubleshooting, and this powerful tool delivers a "useful, but potentially dangerous, option for creating a port redirection link". Learn how to set up port redirects with ncat in this tutorial.
Learn to use tcpdump's filtering capability to make it easier to make sense of your network data in this quick, informative tutorial.
Tcpdump is a valuable network utility that can be used for troubleshooting and debugging. This article demystifies tcpdump - examining its options, as well as a real-world use case, for debugging networking issues in your Linux environment.
As a Linux user, you can opt either to allow or restrict network access to some services or IP addresses using the firewalld firewall which is native to CentOS/RHEL 8 and most RHEL based distributions such as Fedora. Learn how to do this in a helpful tutorial.
Capturing network traffic packets provides insight into what's happening on your network - but you don't want just anyone to do it. Learn how to safely capture packets in this article.
OpenVPN is an open-source application that allows you to create a secure private network over the public internet. OpenVPN implements a virtual private network (VPN) to create a secure connection. OpenVPN uses the OpenSSL library to provide the encryption and it provides several authentication mechanisms, such as certificate-based, pre-shared keys, and username/password authentication. Learn how to install OpenVPN with Easy-RSA 3 on CentOS 8:
Are you aware that deploying automated decoys can help protect your network and reduce IT costs?
Conducting regular maintenance and updates are the easiest ways to secure your corporate WiFi network.
Firewalls are a vital part of network security, so it’s important for a sysadmin to be familiar with how they work. If you understand firewalls, you can keep your network secure by making intelligent choices about the traffic you allow in and out.
In 2019, is there anything that the mighty, $35, credit card-sized Raspberry Pi computer can't do? It seems there isn't; recent Raspberry Pi projects include a functional smartphone, a computer vision kit, and even a movie projector for a more traditional home theater experience.
We spend a lot of our online time out and about these days, using our mobile phones and connecting over cellular networks or public Wi-Fi…
Shannon Nelson from the Oracle Linux Kernel Development team offers these tips and tricks to help make host network diagnostics easier. He also includes a recommended playlist for accompanying your debugging!
PriTunl is a fantastic VPN terminator solution that's perfect for small businesses and individuals who want a quick and simple way to access their network privately. It's open source, and the basic free version is more than enough to get you started and cover most simple use cases.
Learning Nagios 3.0 is a comprehensive configuration guide to monitor and maintain your network and systems. It is a practical guide to setting up the Nagios 3.0 open source network monitoring tool, installing and configuring Nagios 3 on various operating systems. It will help understand system monitoring and how Nagios works. Nagios 3 is a system that watches to see whether hosts and services are working properly, and notifies users when problems occur. Nagios allows both the monitoring of services on its own, and the receipt of information about computer and service statuses from other applications. Nagios constantly checks other machines on your network and various services on those machines. It is a modular and flexible solution that uses plug-ins to do its job.
I need some help in writing snort rules for the following, I have never done this before, can someone please help me. Thanks 1. (1 point) Write a Snort rule that will alert on TCP traffic exiting the 10.0.1.0/24 network with the content "proprietary". I do not care where the traffic is going or what ports it is using. When Snort creates the alert it should read "Proprietary information leaving!" 2. (1 point) Write a Snort rule that will log any TCP traffic entering into the 192.168.100.0/24 and 10.2.2.0/24 networks with destination ports 1 through 1024. I do not care about the source IP addresses or source ports. When Snort logs the traffic it should read "Incoming to low ports". 3. (1 point) Write a Snort rule that will alert on UDP traffic entering the 192.168.10.0/24 network that contains the content "cgi-bin" anywhere between the 5th byte offset to the 25th byte offset. The alert should trigger on both lowercase and uppercase content. I do not care about the source ports or destination ports. When Snort creates the alert it should read "UDP CGI exploit".
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.