Web Directory

  Documentation (22)

Submit a Featured Link: [$19.00] Submit a Regular Link: [$9.00]  

See Also - Related Categories
Regular Websites in this category

Linux Security HOWTO Open in a new windowLink Details
- General overview of security issues that face the administrator of Linux systems. It covers general security philosophy and a number of specific examples of how to better secure your Linux system from intruders.
- http://scrye.com/~kevin/lsh/t1.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Firewall Piercing mini-HOWTO Open in a new windowLink Details
- Tutorial on using ppp over telnet to do network stuff transparently through an Internet firewall. (François-René Rideau)
- http://en.tldp.org/HOWTO/Firewall-Piercing/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Linux Bridge+Firewall Mini-HOWTO Open in a new windowLink Details
- A tutorial on how to setup a bridge and a firewall with Linux, by Peter Breuer.
- http://en.tldp.org/HOWTO/Bridge+Firewall.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Linux IPCHAINS-HOWTO Open in a new windowLink Details
- Describes how to obtain, install and configure the enhanced IP firewalling chains software for Linux, and how they might be used, by Paul Russell.
- http://en.tldp.org/HOWTO/IPCHAINS-HOWTO.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Secure POP via SSH mini-HOWTO Open in a new windowLink Details
- Explains how to set up secure POP connections using ssh, by Manish Singh.
- http://en.tldp.org/HOWTO/Secure-POP+SSH.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Firewalling and Proxy Server HOWTO Open in a new windowLink Details
- Teaches the basics of firewall systems and give you some detail on setting up both a filtering and proxy firewall on a Linux based PC, by Mark Grennan.
- http://en.tldp.org/HOWTO/Firewall-HOWTO.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
UnOfficial SELinux FAQ Open in a new windowLink Details
- A technical FAQ for the NSA SELinux project, which covers installation and implementation issues.
- http://www.crypt.gen.nz/selinux/faq.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Network Security Information: UNIX Open in a new windowLink Details
- Network Security Library has links to many UNIX (and, especially, Linux) security articles on host hardening, security admin guides, and special purpose hardening tips.
- http://secinf.net/unix_security/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Linux Security White Papers Open in a new windowLink Details
- A small collection of Linux security white papers and other information resources. The papers cover secure shell (ssh), host security, and firewalls.
- http://www.ists.dartmouth.edu/IRIA/knowledge_base/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Setting up a secure Linux server Open in a new windowLink Details
- Setting up a secure Linux server using RedHat and the Linux From Scratch system.
- http://www.fiveanddime.net/ss/secureserver.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Securing NIS Open in a new windowLink Details
- Provides a checklist on how to secure UNIX/Linux NIS (formerly YP) services in an intranet environment.
- http://www.eng.auburn.edu/users/doug/nis.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Rusty's Remarkably Unreliable Guides Open in a new windowLink Details
- Netfilter project provides HOWTOs for packet filtering, NAT and netfilter code hacking for Linux.
- http://www.samba.org/netfilter/unreliable-guides/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Ritter's Crypto Glossary and Dictionary of Technical Cryptography Open in a new windowLink Details
- Hyperlinked definitions and discussions of many cryptographic, mathematics, logic, statistics, and electronics terms used in cipher construction and analysis.
- http://www.ciphersbyritter.com/GLOSSARY.HTM

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Installing a firewall, Part 1 Open in a new windowLink Details
- Get the details of a secure Trustix 1.1 installation
- http://www.itworld.com/Sec/2211/LWD111010fwinstall1/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Linuxs security basics Open in a new windowLink Details
- How to achieve the goal of every system admin: boring, predictable computers
- http://www.itworld.com/Man/3872/lw-01-security/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
YoLinux: Internet Server Security HowTo and Tutorial Open in a new windowLink Details
- This tutorial covers the installation and use of hacker protection software such as Portsentry, tripwire, ssh. It also covers configuration and administration steps to make a Linux server secure against hackers.
- http://yolinux.com/TUTORIALS/LinuxTutorialInternetSecurity.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
A Simple Scheme to Make Passwords Based on One-Way Functions Much Harder to Crack Open in a new windowLink Details
- Discusses the possibility that crackers might generate and distribute a massive list of encrypted passwords.
- ftp://ftp.cs.arizona.edu/reports/1994/TR94-34.ps

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Introduction to Linux Networking and Security Open in a new windowLink Details
- Brief introduction to the IP networking services, how to configure them, and how to set up a relatively secure Linux workstation. Published in ACM Crossroads, the ACM student magazine.
- http://www.acm.org/crossroads/xrds6-1/linuxsec.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Linux Firewall Howto Open in a new windowLink Details
- Firewall HOWTO collection, ids, nids, hardening, penetration testing, auditing
- http://www.linux-sec.net/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
A Short History of Cryptography Open in a new windowLink Details
- A brief historical analysis of the management of cryptography.
- http://www.all.net/books/ip/Chap2-1.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Linux Administrator's Security Guide Open in a new windowLink Details
- A comprehensive security guide aimed at administrators and users, available online in Acrobat PDF format, by Kurt Seifried.
- https://www.seifried.org/lasg/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing

Submit a Featured Link: [$19.00]  Submit a Regular Link: [$9.00]