Linux for Security Applications

    Date13 Aug 2000
    CategoryFirewalls
    3810
    Posted ByAnthony Pell
    Firewalls seem to be the stuff of legend in the IT community. Everyone has one because they're afraid of system crackers, viruses, and other nefarious things, but very few people know what a firewall is, let alone how to construct one. . . . Firewalls seem to be the stuff of legend in the IT community. Everyone has one because they're afraid of system crackers, viruses, and other nefarious things, but very few people know what a firewall is, let alone how to construct one. This article will give you a good overview of what happens under the hood, and how you might use Linux in other security applications such as penetration-testing and intrusion detection.
    You are not authorised to post comments.

    LinuxSecurity Poll

    Do you reuse passwords across multiple accounts?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    13
    radio
    [{"id":"55","title":"Yes","votes":"4","type":"x","order":"1","pct":44.44,"resources":[]},{"id":"56","title":"No","votes":"5","type":"x","order":"2","pct":55.56,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.