Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 23rd, 2015
Linux Advisory Watch: March 20th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Secure my network
Find the HOWTO or step-by-step guide that you need right here.

IDS: Protecting Your Networks from Attacks  02 December 2004 
Source: "IDS: Protecting Your Networks from Attacks" - Posted by Administrator   
This white paper presents how, when implemented properly, an intrusion detection device can provide a powerful and cost-effective solution that complements a firewall in protecting your corporate assets. The technological advancements include increas
Wi-Fi Security: What Hackers Know That You Don't  02 December 2004 
Source: "Wi-Fi Security: What Hackers Know That You Don't" - Posted by Administrator   
This white paper describes the methods, skills, and tools that hackers use to exploit vulnerabilities in 802.11 wireless LANs. A good understanding of hacker tools and techniques and the vulnerabilities they exploit enables security managers to take
Wireless LAN Security  30 November 2004 
Source: "Wireless LAN Security" - Posted by Administrator   
Although a variety of wireless network technologies have or will soon reach the general business market, wireless LANs based on the 802.11 standard are the most likely candidate to become widely prevalent in corporate environments. Current 802.11
IPCop  30 November 2004 
Source: "IPCop" - Posted by Administrator   
IPCop is a cut-down Linux distribution that is intended to operate as a firewall, and only as a firewall. It has some advanced firewalling features, including VPNs using IPSec. This article describes the set-up and use of IPCop, and contains a few co
A Private Home Network  29 November 2004 
Source: "A Private Home Network" - Posted by Administrator   
This documentation discusses how one can setup a "secure" home network.
Linux Network Security  29 November 2004 
Source: "Linux Network Security" - Posted by Administrator   
This documentation will show many methods to batten down the hatches and set up a really secure Linux Network.
Designing Secure Networks Based on the Software Process Model  29 November 2004 
Source: " Designing Secure Networks Based on the Software Process Model" - Posted by Administrator   
This documentation will present the basic tenets of a network security engineering process. It will also show that the network security process, as opposed to a point tool, coincides with the creation of new threats.
Network Security Intro  29 November 2004 
Source: "Network Security Intro" - Posted by Administrator   
This document starts with "What is a network" and goes on to describe the OSI model, risk management, denial of service, authorization, types of firewalls, and more.
Intrusion Detection Systems for your network  29 November 2004 
Source: "Intrusion Detection Systems for your network" - Posted by Administrator   
This documentations, part 1 of a series of articles, will help you field yourself against the imminent dangers that you will have to face when you decide to open up your business to the anarchy of the Internet. The article goes in depth on the data a
Basic Steps in Forensic Analysis of Unix Systems  29 November 2004 
Source: "Basic Steps in Forensic Analysis of Unix Systems" - Posted by Administrator   
This document, written by Dave Dittrich, provides a great foundation for performing a postmortem on your box once it's been rooted.
<< Start < Prev 4 5 6 Next > End >>

Results 41 - 50 of 108


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
OpenSSL Mystery Patch is No Heartbleed
Study: One-third of top websites vulnerable or hacked
Threat-sharing cybersecurity bill unveiled
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.