Firewall - Page 5
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Chris Lowth submits squidGuard describes itself as: "An ultrafast and free filter, redirector and access controller for Squid". In my experience, it is the ideal web filter for use with Smoothwall since it is lightweight and easy to set . . .
When setting up IPTABLES firewalling for Linux systems running the NFS service (network file system), you hit the problem that some of the TCP/IP and UDP ports used by components of the service are randomly generated as part of the "SunRPC" mechanism. . .
Packet Filter (from here on referred to as PF) is OpenBSD's system for filtering TCP/IP traffic and doing Network Address Translation. PF is also capable of normalizing and conditioning TCP/IP traffic and providing bandwidth control and packet prioritization. PF has been a part of the GENERIC OpenBSD kernel since OpenBSD 3.0. Previous OpenBSD releases used a different firewall/NAT package which is no longer supported.. . .
Johannes Faustus submits, Steven M. Bellovin (co-author of the classic and recently re-published Firewalls and Internet Security: Repelling the Wily Hacker) has an interesting paper on detecting NATs (Network Address Translation setups) and counting the hosts behind the NAT box.. . .
Check Point Software Technologies has the largest market share of any firewall vendor with their Firewall-1 (FW-1) product, and Nokia manufactures several hardware appliances together with an operating system called IPSO to run FW-1. IPSO is based on FreeBSD, provides advanced . . .
I've been hearing a lot of talk lately about firewall appliances and how much of a pain they can be to use. Many of them tend to be Windows-specific in various ways, or they don't have all the flexibility us Penguin-heads . . .
As recently as a few years ago, IT personnel were trained to harden their network perimeter, barring outsiders entirely. In contrast, today's security environment is far less clear-cut -- and the role of firewalls is expanding. . .
Mirko Zorz submits With many new and improved products on the market, this has been a good year for designing VPNs and deploying firewalls. Here's an overview of happenings during 2002 with exclusive comments from David Flynn, Vice President . . .
There's nothing like getting a computer for Christmas - especially if it's somebody else's. If your machine's on the Internet, it's under near-constant attack from people who'd like to ''own'' it. And if some digital crook can read all of . . .
ICSA Labs, which provides one of the most important certifications firewall vendors strive for, said yesterday it has completed the first wave of tests of product against version 4.0 of its certification criteria, writes Kevin Murphy. For the first time, . . .
Worldwide revenue from sales of VPN (virtual private network) and firewall hardware and software will grow by 31 percent from $668 million in the third quarter of 2002 to $874 million in the third quarter of next year, according to research released Wednesday by Infonetics Research. . .
LEAF is an easy to use embedded Linux network appliance for use in small office, home office, and home automation environments. Although it can be used in other ways, it's primarily used as a gateway/router/firewall for Internet leaf sites.. . .
Linux firewalls--it's one of the hot topics for CIOs and IT managers at the moment. ZDNet Australia takes a look at some of the options available for IT departments. Monitoring traffic, configuration glitches, and decisions about which firewall to opt for--they are all issues facing Australia's IT managers. Here we feature some tips, reports and analysis about Linux firewalls.. . .
A firewall is software or hardware that sits between two networks -- typically, between your LAN and the Internet -- and allows some sorts of network traffic through while preventing others. It works by rules that you set, which define the . . .
An old PC can be the ideal platform to realize a network firewall based on Linux. The system configuration needs a bit of attention but it's not a difficult task to fulfill. The only doubt concerns which kernel version better suits . . .
The threat of an external attack on the corporate network is now so great that companies need to consider a firewall. There is no excuse for failing to protect data on a network and there are plenty of options on the . . .
Worms are a major threat to the Internet. Their automatic nature makes them powerful and destructive. Using existing and evolving methods of propagation, it is likely that they will become increasingly more powerful. Solutions based on diligent application of patches or . . .
John Gowin wrote in about using IP masquerading and Debian to build a simple firewall. "This tutorial will give you the necessary steps to turn one of your old PCs into a firewall with IP Masquerading, using a popular Linux distribution. I will leave it to you to get and install Debian onto your machine and work out connectivity to your ISP, then I will guide you through a kernel compile and install. . .
Rule No. 1: Firewalls are all about access control. You create a set of rules defining which ports to keep open, which to disallow, and any IP addresses or entire networks to block. A firewall on the edge of your network is effective only if it is configured correctly. And don't forget in-house traffic--firewalls are not just for Internet connections. . .
End-user investment in firewalls and virtual private networks (VPNs) will lead to the security market growing to $18.9bn worldwide by 2005, according to a report by analyst Datamonitor. Awareness of cyberterrorism has forced companies to focus on the effectiveness of their . . .