How to: Secure My Network in Linux

Find the HOWTO or step-by-step guide that you need right here.

 

Discover How To Secure My Network HOWTOs

Introduction to IPv6

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This documentation discusses the configurations of IP version 6. The goal of this documentation is to get you online with IPv6, giving example configurations for BSD Unix and Linux.

ICMP Usage in Scanning: The Complete Know-How

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This documentation outlines the usage of ICMP protocol in the scanning process. This documentation also, in Step-by-Step process, uncovers each of the malicious computer attacker techniques using the ICMP protocol. A few new scanning techniques will

Through the Tunnel

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this article, we present a few examples on how to use ssh to tunnel data from/to external applications. "VPN (Virtual Private Network) relies on ssh but in a different way, much more elaborate than the one we take up here. Another sophisticated so

Securing Wireless Networks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This documentation will offer an overview of some of the options that are available to enhance the security of wireless networks, including: MAC address filtering, vendor specific authentication, SSID/Network ID, Wired Equivalent Privacy (WEP) and em

IP Spoofing

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This documentation discusses how an attacker can conduct an IP Spoofing attack. A spoofing attack involves forging one's source address. It is the act of using one machine to impersonate another.

Securing OSPF

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This documentation discusses OSPF (Open Shortest Path First), an open standard IP routing protocol. OSPF is a link-state routing protocol. Link-state routing protocols take the actual state of the network link into account when creating routing table

LIDS Hacking HOWTO

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This Document is for LIDS ( Linux Intrusion Detection System) Project and mainly about the impletementation of LIDS in the kernel. The target of the LIDS is to enhance the current Linux Kernel, to make it more solidate and more secure. In order to ac

SSL is not a magic bullet

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This documentation examines how SSL works, what it can do, and how the products and applications that use SSL have failed, resulting in updates to Netscape Navigator and Microsoft's Internet Explorer and IIS this year.

Sniffin' the Ether

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This document describes Ethernet sniffing, various tools for doing so, and how it is used to glean passwords from your local subnet.

Secure Shell FAQ

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Secure Shell is a method of logging into a remote host using strong authentication and encryption. It is an excellent telnet and ftp replacement, and should be included in any secure environment.

VPN Masquerade HOWTO

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

How to configure a Linux firewall to masquerade IPsec-and PPTP-based Virtual Private Network traffic, allowing you to establish a VPN connection without losing the security and flexibility of your Linux firewall's internet connection and allowing you