Home    |Web Directory    |Metasearch    |Message Boards    |Classified Ads|

Web Directory

Home

Web Directory

Metasearch

Message Boards

Classified Ads








Documentation (20)

See Also:
Sites:

http://www.all.net/books/ip/Chap2-1.html
» A Short History of Cryptography Open in a new browser window
   A brief historical analysis of the management of cryptography.
   http://www.all.net/books/ip/Chap2-1.html
ftp://ftp.cs.arizona.edu/reports/1994/TR94-34.ps
» A Simple Scheme to Make Passwords Based on One-Way Functions Much Harder to Crack Open in a new browser window
   Discusses the possibility that crackers might generate and distribute a massive list of encrypted passwords.
   ftp://ftp.cs.arizona.edu/reports/1994/TR94-34.ps
http://en.tldp.org/HOWTO/Firewall-Piercing/
» Firewall Piercing mini-HOWTO Open in a new browser window
   Tutorial on using ppp over telnet to do network stuff transparently through an Internet firewall. (François-René Rideau)
   http://en.tldp.org/HOWTO/Firewall-Piercing/
http://en.tldp.org/HOWTO/Firewall-HOWTO.html
» Firewalling and Proxy Server HOWTO Open in a new browser window
   Teaches the basics of firewall systems and give you some detail on setting up both a filtering and proxy firewall on a Linux based PC, by Mark Grennan.
   http://en.tldp.org/HOWTO/Firewall-HOWTO.html
http://www.itworld.com/LWD111010fwinstall1
» Installing a firewall, Part 1 Open in a new browser window
   Get the details of a secure Trustix 1.1 installation
   http://www.itworld.com/LWD111010fwinstall1
http://www.acm.org/crossroads/xrds6-1/linuxsec.html
» Introduction to Linux Networking and Security Open in a new browser window
   Brief introduction to the IP networking services, how to configure them, and how to set up a relatively secure Linux workstation. Published in ACM Crossroads, the ACM student magazine.
   http://www.acm.org/crossroads/xrds6-1/linuxsec.html
http://en.tldp.org/HOWTO/Bridge+Firewall.html
» Linux Bridge+Firewall Mini-HOWTO Open in a new browser window
   A tutorial on how to setup a bridge and a firewall with Linux, by Peter Breuer.
   http://en.tldp.org/HOWTO/Bridge+Firewall.html
http://www.linux-sec.net/
» Linux Firewall Howto Open in a new browser window
   Firewall HOWTO collection, ids, nids, hardening, penetration testing, auditing
   http://www.linux-sec.net/
http://en.tldp.org/HOWTO/IPCHAINS-HOWTO.html
» Linux IPCHAINS-HOWTO Open in a new browser window
   Describes how to obtain, install and configure the enhanced IP firewalling chains software for Linux, and how they might be used, by Paul Russell.
   http://en.tldp.org/HOWTO/IPCHAINS-HOWTO.html
http://www.itworld.com/lw-01-security
» Linux Security Basics Open in a new browser window
   How to achieve the goal of every system admin: boring, predictable computers
   http://www.itworld.com/lw-01-security
http://scrye.com/~kevin/lsh/t1.html
» Linux Security HOWTO Open in a new browser window
   General overview of security issues that face the administrator of Linux systems. It covers general security philosophy and a number of specific examples of how to better secure your Linux system from intruders.
   http://scrye.com/~kevin/lsh/t1.html
http://www.windowsecurity.com/whitepapers/unix_security/
» Network Security Information: UNIX Open in a new browser window
   Network Security Library has links to many UNIX (and, especially, Linux) security articles on host hardening, security admin guides, and special purpose hardening tips.
   http://www.windowsecurity.com/whitepapers/unix_security/
http://www.ciphersbyritter.com/GLOSSARY.HTM
» Ritter's Crypto Glossary and Dictionary of Technical Cryptography Open in a new browser window
   Hyperlinked definitions and discussions of many cryptographic, mathematics, logic, statistics, and electronics terms used in cipher construction and analysis.
   http://www.ciphersbyritter.com/GLOSSARY.HTM
http://people.netfilter.org/~rusty/unreliable-guides/
» Rusty's Remarkably Unreliable Guides Open in a new browser window
   Netfilter project provides HOWTOs for packet filtering, NAT and netfilter code hacking for Linux.
   http://people.netfilter.org/~rusty/unreliable-guides/
http://en.tldp.org/HOWTO/Secure-POP+SSH.html
» Secure POP via SSH mini-HOWTO Open in a new browser window
   Explains how to set up secure POP connections using ssh, by Manish Singh.
   http://en.tldp.org/HOWTO/Secure-POP+SSH.html
http://www.eng.auburn.edu/users/doug/nis.html
» Securing NIS Open in a new browser window
   Provides a checklist on how to secure UNIX/Linux NIS (formerly YP) services in an intranet environment.
   http://www.eng.auburn.edu/users/doug/nis.html
http://www.fiveanddime.net/ss/secureserver.html
» Setting up a secure Linux server Open in a new browser window
   Setting up a secure Linux server using RedHat and the Linux From Scratch system.
   http://www.fiveanddime.net/ss/secureserver.html
http://www.crypt.gen.nz/selinux/faq.html
» UnOfficial SELinux FAQ Open in a new browser window
   A technical FAQ for the NSA SELinux project, which covers installation and implementation issues.
   http://www.crypt.gen.nz/selinux/faq.html
http://yolinux.com/TUTORIALS/LinuxTutorialInternetSecurity.html
» YoLinux: Internet Server Security HowTo and Tutorial Open in a new browser window
   This tutorial covers the installation and use of hacker protection software such as Portsentry, tripwire, ssh. It also covers configuration and administration steps to make a Linux server secure against hackers.
   http://yolinux.com/TUTORIALS/LinuxTutorialInternetSecurity.html

This category needs an editor

Last Updated: 2007-01-02 19:56:58





Help build the largest human-edited directory on the web.
Submit a Site - Open Directory Project - Become an Editor

The content of this directory is based on the Open Directory and has been modified by GoSearchFor.com

Free previews by Thumbshots.org