
|
|
|
|
Home / Computers / Software / Operating Systems / Linux / Security / Documentation
|
|
|
|
Web Sites
|
- A Short History of Cryptography - A brief historical analysis of the management of cryptography.
www.all.net/books/ip/Chap2-1.html
- A Simple Scheme to Make Passwords Based on One-Way Functions Much Harder to Crack - Discusses the possibility that crackers might generate and distribute a massive list of encrypted passwords.
ftp://ftp.cs.arizona.edu/reports/1994/TR94-34.ps
- Dansguardian on MandrakeSecurity SNF 7.2 - How to install Dansguardian content filter on Mandrake's MandrakeSecurity SNF (Linux Based Firewall) with squidGuard URL filtering built in.
www.bkahuna.scripterz.org/dg-on-snf.html
- Firewall Piercing mini-HOWTO - Tutorial on using ppp over telnet to do network stuff transparently through an Internet firewall. (François-René Rideau)
www.linuxdoc.org/HOWTO/mini/Firewall-Piercing.html
- Firewalling and Proxy Server HOWTO - Teaches the basics of firewall systems and give you some detail on setting up both a filtering and proxy firewall on a Linux based PC, by Mark Grennan.
www.linuxdoc.org/HOWTO/Firewall-HOWTO.html
- Installing a firewall, Part 1 - Get the details of a secure Trustix 1.1 installation
www.itworld.com/Sec/2211/LWD111010fwinstall1
- Introduction to Linux Networking and Security - Brief introduction to the IP networking services, how to configure them, and how to set up a relatively secure Linux workstation. Published in ACM Crossroads, the ACM student magazine.
www.acm.org/crossroads/xrds6-1/linuxsec.html
- Linux Administrator's Security Guide - A comprehensive security guide aimed at administrators and users, available online in Acrobat PDF format, by Kurt Seifried.
https://www.seifried.org/lasg
- Linux Bridge+Firewall Mini-HOWTO - A tutorial on how to setup a bridge and a firewall with Linux, by Peter Breuer.
www.linuxdoc.org/HOWTO/mini/Bridge+Firewall.html
- Linux Firewall Howto - Firewall HOWTO collection, ids, nids, hardening, penetration testing, auditing
www.Linux-Sec.net
- Linux IPCHAINS-HOWTO - Describes how to obtain, install and configure the enhanced IP firewalling chains software for Linux, and how they might be used, by Paul Russell.
www.linuxdoc.org/HOWTO/IPCHAINS-HOWTO.html
- Linux Security - General overview of security issues that face the administrator of Linux systems. It covers general security philosophy and a number of specific examples of how to better secure your Linux system from intruders.
scrye.com/~kevin/lsh/Security-HOWTO.html
- Linux Security HOWTO - Security issues that face the administrator, security philosophy, examples of how to secure the system from intruders.
www.linuxdoc.org/HOWTO/Security-HOWTO.html
- Linuxs security basics - How to achieve the goal of every system admin: boring, predictable computers
www.itworld.com/Man/3872/lw-01-security
- Ritter's Crypto Glossary and Dictionary of Technical Cryptography - Hyperlinked definitions and discussions of many cryptographic, mathematics, logic, statistics, and electronics terms used in cipher construction and analysis.
www.ciphersbyritter.com/GLOSSARY.HTM
- Rusty's Remarkably Unreliable Guides - Netfilter project provides HOWTOs for packet filtering, NAT and netfilter code hacking for Linux.
www.samba.org/netfilter/unreliable-guides
- Secure POP via SSH mini-HOWTO - Explains how to set up secure POP connections using ssh, by Manish Singh.
www.linuxdoc.org/HOWTO/mini/Secure-POP+SSH.html
- Securing NIS - Provides a checklist on how to secure UNIX/Linux NIS (formerly YP) services in an intranet environment.
www.eng.auburn.edu/users/doug/nis.html
- Security Overviews - Sec.ure.org contains overviews of security-enhancing procedures including Apache authentication, LDAP and several others.
sec.ure.org
- Using Term to Pierce an Internet Firewall - Tutorial on using 'term' to do network stuff through a TCP firewall that you're not supposed to be able to, by Barak Pearlmutter.
www.linuxdoc.org/HOWTO/mini/Term-Firewall.html
- YoLinux: Internet Server Security HowTo and Tutorial - This tutorial covers the installation and use of hacker protection software such as Portsentry, tripwire, ssh. It also covers configuration and administration steps to make a Linux server secure against hackers.
yolinux.com/TUTORIALS/LinuxTutorialInternetSecurity.html
|
|
|
|
|