Similar Articles |
|
Linux Journal June 1, 2002 David A. Bandel |
Kernel Korner: A NATural Progression A look at network address translation and how to avoid common errors when constructing iptables rules... |
Linux Journal September 2001 David A. Bandel |
Taming the Wild Netfilter Need to upgrade the moat on your castle? Here's how to use Netfilter and ipchains to increase security on home systems... |
Linux Journal April 2000 Preston F. Crow |
The Linux Home Network Everything you need to know to make those Internet and intranet connections at home. |
RootPrompt.org September 11, 2000 |
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... |
Linux Journal April 1, 2007 Mick Bauer |
Paranoid Penguin - Linux Firewalls for Everyone Need a personal firewall, an enterprise Internet gateway or something in between? iptables does it all! |
Linux Journal May 1, 2007 Michael Rash |
Protecting SSH Servers with Single Packet Authorization Lock down access to SSH with Single Packet Authorization. With this setup on a Linux system, no one will be able to tell that SSHD is even listening under an nmap scan, and only authenticated and authorized clients will be able to communicate with SSHD. |
Linux Journal March 2000 Jeff Regan |
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. |
Linux Journal March 1, 2007 Sean Walberg |
How to Configure SIP and NAT Can you hear me now? Making VoIP work through a NAT gateway. |
Linux Journal August 1, 2007 Ben Martin |
Create a Linux VPN for a Nokia E61 with Openswan A virtual private network (VPN) allows you to send traffic across an untrusted network without exposing the content of that traffic. The example in this article is connecting a Nokia E61 device to a home network through a VPN over the Internet. |
Linux Journal January 1, 2007 Mick Bauer |
Paranoid Penguin - Running Network Services under User-Mode Linux, Part III Fine-tune and firewall your User-Mode Linux guest systems. |
RootPrompt.org August 30, 2000 |
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. |
PC Magazine October 5, 2004 Sheryl Canter |
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. |
PC Magazine February 15, 2006 Matthew D. Sarrel |
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. |
Linux Journal December 1, 2002 Mick Bauer |
Configuring and Using an FTP Proxy How to add a layer of security between the bad guys and your public FTP servers. |
RootPrompt.org May 7, 2001 |
Testing a Router or Firewall We do not present a generic high level method. Indeed, every network administrator has its own way to set up a device or to solve a problem. We emphasize on the low level method by presenting key points, which can be linked together in order to construct the method of every person... |
PC Magazine August 3, 2004 |
Keep Your PC Safe Learn to wield your firewall, antivirus, and antispyware tools expertly; don't give up your PC without a fight. |
PC Magazine March 2, 2004 Davis D. Janowski |
Small-Business Security For cash-strapped, IT-barren companies, all-in-one security appliances offer affordable protection. Here's how to make one work for your network. |
RootPrompt.org September 13, 2000 Sander Plomp |
Amateur Fortress Building in Linux Part 2 Of course, deep down there is always some potential for catastrophic security hole - in the TCP stack, the kernel, whatever. That is inevitable. I can live with that. I just don't want it to be a biweekly event... |
RootPrompt.org June 14, 2000 |
The Secrets of Snoop Lance Spitzner tell us about the secrets of Snoop: A passive approach to your network security. |
Macworld February 2001 J.W. Davis |
WatchGuard SOHO Security Appliance Offers Pricey Protection for Small Networks... |
PC World March 11, 2001 |
Top 5 Firewall Utilities Protect your PC from suspicious activity on your network or the Internet... |
PC Magazine April 3, 2006 Oliver Kaven |
Anthology Solutions Yellow Machine P400T The Yellow Machine P400T is a NAS-router-switch-firewall-Web server in one toaster-size device. |
Linux Journal August 2000 Denny Fox |
Product Review After watching the wireless networking developments for quite a while, I have finally found an affordable wireless solution that works with Linux. |
PC World December 2003 Scott Spanbauer |
Ultimate Network Security: How to Install a Firewall Everything you need to know about selecting and installing a firewall for your PC or network. |
PC Magazine December 22, 2004 Konstantinos Karagiannis |
Sniffing out Secrets Whether you're interacting with someone in real time through an insecure protocol like instant messaging or sending sensitive information in an e-mail, your data can pass the virtual noses of many Ethernet interfaces. And some of those noses are sniffing. |
Unix Insider November 2000 Sandra Henry-Stocker |
Tapping on the walls Paring down your network services isn't the only way to protect your systems against attacks: port scanning can also be an effective tool. Here's how to stay one step ahead of your enemy... |
Linux Journal February 1, 2002 Gianluca Insolvibile |
Inside the Linux Packet Filter In Part I of this two-part series on the Linux Packet Filter, the author describes a packet's journey through the kernel... |
Linux Journal December 22, 2001 Jeremy D. Impson |
VNC, Securely: Part 2 Secure, transparent and ubiquitous desktops with VNC and OpenSSH... |
Linux Journal April 1, 2002 Alan Zeichick |
Product Review: SnapGear Lite An Inexpensive Home Office/Small Office Firewall and VPN Client... |
Linux Journal May 1, 2002 Pedro Paulo Ferreira Bueno |
Understanding IDS for Linux A discussion of the different types of intrusion detection systems and how to create signatures to identify attacks... |
RootPrompt.org April 24, 2000 Lance Spitzner |
Preparing Your Box For the Internet The basics of securing a Linux box. The examples provided here are based on Red Hat 6.0, but should apply to most Linux distributions. |
Linux Journal December 12, 2006 Dempster & Eaton-Lee |
Excerpt from the book "Configuring IPCop Firewalls: Closing Borders with Open Source" IPCop is a firewall for the Small Office/Home Office network, which is extremely easy to use and is released under the GPL. This excerpt outlines a few common methods of deploying IPCop and the motivation behind these topologies along with descriptions of some of the features you can deploy. |
Linux Journal March 2, 2007 Michael Rash |
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. |
PC Magazine July 19, 2007 Matthew D. Sarrel |
Astaro Security Gateway 120 (Updated) The Astaro Security Gateway 120 will keep your small business safe, but it's strangely expensive for a product built on an open-source foundation. |
Macworld May 2001 Mel Beckman |
Norton Personal Firewall 1.0 Internet-protection software for individual users needs beefing up... |
RootPrompt.org April 10, 2000 Lance Spitzner |
Auditing Your Firewall How to Audit Your Firewall Setup. |
CIO February 1, 2002 Scott Berinato |
Cs3 Los Angeles software maker Cs3 likes to look at problems from a different direction -- its MANAnet Reverse Firewall prevents distributed denial-of-service (DDOS) attacks from leaving a network once they enter, helping to stop such assaults from propagating across the Internet... |
Linux Journal April 1, 2007 Nicholas Petreley |
/var/opinion - Do Not Forget What People Fetch How to use iptables to route web surfing through a protective filter. |
InternetNews February 19, 2008 Andy Patrizio |
SonicWall Firewalls Boast Increased Throughput Firewall vendor SonicWall today introduced the SonicWall Network Security Appliance Series, a trio of multifunction firewalls aimed at the mid-enterprise. |
PC Magazine February 2, 2005 Robert P. Lipschutz |
Lock Down Your Network When it comes to security, small and midsize businesses (SMBs) often find themselves in an uncomfortable position. They share many of the same security fears that threaten multinational enterprises. |
PC Magazine September 21, 2004 |
NAT Enough? A home router is not a complete security solution. |
Linux Journal February 1, 2004 Brad Hards |
A Guided Tour of Ethereal Learn exactly what's in all those packets flying by on your network with this essential development and administration tool. |
Linux Journal March 1, 2007 Sean Walberg |
Expose VoIP Problems Using Wireshark Sniff out VoIP problems with Wireshark, an open-source network protocol analyzer. VoIP involves a complex set of protocols that Wireshark can decode and relate to each other. |
Macworld May 24, 2006 Jeffery Battersby |
Mac OS X Firewall OS X's built-in firewall is enough for most users |
Popular Mechanics June 2007 Joel Johnson |
Hack Attack: Is the Whole Internet at Risk? Some hackers recently tried to take down the entire World Wide Web. You didn't even notice because the Internet is so robust. |
Linux Journal August 25, 2004 Christian Herzog |
Building a Diskless 2.6 Firewall For your next DIY project, pick up an old Pentium computer and a CompactFlash card and build a custom router/firewall using Linux. |
RootPrompt.org August 14, 2000 |
Building A Secure Webserver The writers of this article are going to configure a machine that will be placed outside their firewall to act as a web server for their organization. In it they detail what they plan to do to make their server as secure as they can while still satisfying their business requirements. |
InternetNews May 20, 2011 Sean Michael Kerner |
Fedora 15 Linux Gets Dynamic Firewall Tech Linux distro debuts a new type of firewall that enables users and applications to open and close ports on the fly. |
Macworld September 12, 2005 Matt Vance |
DoorStop X 1.0 Open Door Networks' software firewall has a simple interface and offers easy security customization. |
Linux Journal April 2000 |
Best of Technical Support Boot partition and more than 1024 cylinders... Networking Linux with Windows 98... Using Samba for WINS service... Setting display mode in X Windows... Ethernet Cards... |