How to secure my network - Page 2.25
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
This HOWTO shows an easier and cheaper way to securely access remote networks for a small business or an individual.
This document describes the software and procedures to set up and use IEEE 802.1X Port-Based Network Access Control using Xsupplicant as Supplicant with FreeRADIUS as a back-end Authentication Server.
A very hands-on approach to iproute2, traffic shaping and a bit of netfilter.
This is a cookbook recipe on how to set up and run IP aliasing on a Linux box and how to set up the machine to receive e-mail on the aliased IP addresses.
IptablesWeb is a free software (under GPL licence): it makes possible to inspect iptables logs by using a web browser. It's a plugin-based multilanguage software written in PHP using 3 free php classes.
Break through the complexity of SE Linux with a working example that shows how to add SE Linux protection to a simple network server.
This document outlines suggested steps for determining if your system has been compromised.
This document provides a general overview of attacks in which the primary goal of the attack is to deny the victim(s) access to a particular resource.
If your site isn't filtering certain TCP/IP packets, it may not be as secure as you think.
This article should explain how to setup and configure a VPN using CIPE. CIPE may not be standard like IPSec, but it sure is a hell of a lot simpler.
OpenVPN is a full-featured SSL VPN solution which can accomodate a wide range of configurations, including road warrior access, home/office/campus telecommuting, WiFi security, secure branch office linking, and enterprise-scale remote access solution
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength g
The Linux Intrusion Detection System (LIDS) is a kernel patch and admin tools which enhances the kernel's security by implementing Mandatory Access Control (MAC).
This page collects into one place the essential steps needed to generate a private/public key pair and use ssh to connect to remote hosts without having to enter your password or passphrase more than once per boot of your trusted workstation.
This white paper presents how, when implemented properly, an intrusion detection device can provide a powerful and cost-effective solution that complements a firewall in protecting your corporate assets. The technological advancements include increas
This white paper describes the methods, skills, and tools that hackers use to exploit vulnerabilities in 802.11 wireless LANs. A good understanding of hacker tools and techniques and the vulnerabilities they exploit enables security managers to take
Although a variety of wireless network technologies have or will soon reach the general business market, wireless LANs based on the 802.11 standard are the most likely candidate to become widely prevalent in corporate environments. Current 802.11
IPCop is a cut-down Linux distribution that is intended to operate as a firewall, and only as a firewall. It has some advanced firewalling features, including VPNs using IPSec. This article describes the set-up and use of IPCop, and contains a few co
This documentation will show many methods to batten down the hatches and set up a really secure Linux Network.