jasminecorp.net directory
Updated Blogs
Computer Support Blog
Essensial Software for Web Based Support
HP Server and Desktop
HP ILO - Remote Tech-Support Software
More .....



 
 

| Add Search | Advertise With JCSearch | Suggest a Site

Search the Web


Search Results

Documentation
Directory > Computers > Software > Operating Systems > Linux > Security > Documentation

Web Sitesi

UnOfficial SELinux FAQ
A technical FAQ for the NSA SELinux project, which covers installation and implementation issues.
http://www.crypt.gen.nz/selinux/faq.html
Reviews Rating: Not yet Rated Whois Check

Network Security Information: UNIX
Network Security Library has links to many UNIX (and, especially, Linux) security articles on host
hardening, security admin guides, and special purpose hardening tips.

http://secinf.net/unix_security/
Reviews Rating: Not yet Rated Whois Check

Linux Security White Papers
A small collection of Linux security white papers and other information resources. The papers cover
secure shell (ssh), host security, firewalls, etc.

http://www.ists.dartmouth.edu/IRIA/knowledge_base/
Reviews Rating: Not yet Rated Whois Check

Setting up a secure Linux server
Setting up a secure Linux server using RedHat and the Linux From Scratch system.
http://www.fiveanddime.net/ss/secureserver.html
Reviews Rating: Not yet Rated Whois Check

Security Overviews
Sec.ure.org contains overviews of security-enhancing procedures including Apache authentication,
LDAP and several others.

http://sec.ure.org
Reviews Rating: Not yet Rated Whois Check

Securing NIS
Provides a checklist on how to secure UNIX/Linux NIS (formerly YP) services in an intranet
environment.

http://www.eng.auburn.edu/users/doug/nis.html
Reviews Rating: Not yet Rated Whois Check

Rusty's Remarkably Unreliable Guides
Netfilter project provides HOWTOs for packet filtering, NAT and netfilter code hacking for Linux.
http://www.samba.org/netfilter/unreliable-guides/
Reviews Rating: Not yet Rated Whois Check

Ritter's Crypto Glossary and Dictionary of Technical Cryptography
Hyperlinked definitions and discussions of many cryptographic, mathematics, logic, statistics, and
electronics terms used in cipher construction and analysis.

http://www.ciphersbyritter.com/GLOSSARY.HTM
Reviews Rating: Not yet Rated Whois Check

Using Term to Pierce an Internet Firewall
Tutorial on using 'term' to do network stuff through a TCP firewall that you're not supposed to be
able to, by Barak Pearlmutter.

http://www.linuxdoc.org/HOWTO/mini/Term-Firewall.html
Reviews Rating: Not yet Rated Whois Check

Dansguardian on MandrakeSecurity SNF 7.2
How to install Dansguardian content filter on Mandrake's MandrakeSecurity SNF (Linux Based
Firewall) with squidGuard URL filtering built in.

http://www.bkahuna.scripterz.org/dg-on-snf.html
Reviews Rating: Not yet Rated Whois Check

Installing a firewall, Part 1
Get the details of a secure Trustix 1.1 installation
http://www.itworld.com/Sec/2211/LWD111010fwinstall1/
Reviews Rating: Not yet Rated Whois Check

Linuxs security basics
How to achieve the goal of every system admin: boring, predictable computers
http://www.itworld.com/Man/3872/lw-01-security/
Reviews Rating: Not yet Rated Whois Check

YoLinux: Internet Server Security HowTo and Tutorial
This tutorial covers the installation and use of hacker protection software such as Portsentry,
tripwire, ssh. It also covers configuration and administration steps to make a Linux server secure
against hackers.

http://yolinux.com/TUTORIALS/LinuxTutorialInternetSecurity.html
Reviews Rating: Not yet Rated Whois Check

A Simple Scheme to Make Passwords Based on One-Way Functions Much Harder to Crack
Discusses the possibility that crackers might generate and distribute a massive list of encrypted
passwords.

ftp://ftp.cs.arizona.edu/reports/1994/TR94-34.ps
Reviews Rating: Not yet Rated Whois Check

Linux Bridge+Firewall Mini-HOWTO
A tutorial on how to setup a bridge and a firewall with Linux, by Peter Breuer.
http://www.linuxdoc.org/HOWTO/mini/Bridge+Firewall.html
Reviews Rating: Not yet Rated Whois Check

Introduction to Linux Networking and Security
Brief introduction to the IP networking services, how to configure them, and how to set up a
relatively secure Linux workstation. Published in ACM Crossroads, the ACM student magazine.

http://www.acm.org/crossroads/xrds6-1/linuxsec.html
Reviews Rating: Not yet Rated Whois Check

Linux Firewall Howto
Firewall HOWTO collection, ids, nids, hardening, penetration testing, auditing
http://www.Linux-Sec.net
Reviews Rating: Not yet Rated Whois Check

Linux Security
General overview of security issues that face the administrator of Linux systems. It covers general
security philosophy and a number of specific examples of how to better secure your Linux system
from intruders.

http://scrye.com/~kevin/lsh/Security-HOWTO.html
Reviews Rating: Not yet Rated Whois Check

Secure POP via SSH mini-HOWTO
Explains how to set up secure POP connections using ssh, by Manish Singh.
http://www.linuxdoc.org/HOWTO/mini/Secure-POP+SSH.html
Reviews Rating: Not yet Rated Whois Check

Linux Security HOWTO
Security issues that face the administrator, security philosophy, examples of how to secure the
system from intruders.

http://www.linuxdoc.org/HOWTO/Security-HOWTO.html
Reviews Rating: Not yet Rated Whois Check

Linux IPCHAINS-HOWTO
Describes how to obtain, install and configure the enhanced IP firewalling chains software for
Linux, and how they might be used, by Paul Russell.

http://www.linuxdoc.org/HOWTO/IPCHAINS-HOWTO.html
Reviews Rating: Not yet Rated Whois Check

Firewall Piercing mini-HOWTO
Tutorial on using ppp over telnet to do network stuff transparently through an Internet firewall.
(François-René Rideau)

http://www.linuxdoc.org/HOWTO/mini/Firewall-Piercing.html
Reviews Rating: Not yet Rated Whois Check

Firewalling and Proxy Server HOWTO
Teaches the basics of firewall systems and give you some detail on setting up both a filtering and
proxy firewall on a Linux based PC, by Mark Grennan.

http://www.linuxdoc.org/HOWTO/Firewall-HOWTO.html
Reviews Rating: Not yet Rated Whois Check

A Short History of Cryptography
A brief historical analysis of the management of cryptography.
http://www.all.net/books/ip/Chap2-1.html
Reviews Rating: Not yet Rated Whois Check

Linux Administrator's Security Guide
A comprehensive security guide aimed at administrators and users, available online in Acrobat PDF
format, by Kurt Seifried.

https://www.seifried.org/lasg/
Reviews Rating: Not yet Rated Whois Check

 


Jasminecorp.net directory is based on the Open Directory and is being modified by Jasminecorp.

©2004 Jasmine Computers Inc.

Click here to subscribe for Jasminecorp's product News.

Home | JCBid |Software Development | Domain Registration | Hosting | Web Designing | Buy Books | Advertise with JCSearch | Whois | IP Locator | Add Search | Shopping | Store | Free Blogs | Free GuestBook | Free E-Cards | Free Games | Free Tutorials | Set as Home | Add to Favorite | Suggest a Site | Directory | Our Portfolio | Terms of service | Free quote | Tell a Friend | Special Offer | Job Opportunities | games | Usenet Groups

Submit a Site to Jasminecorp.net Directory || Advertise with us

 

Help build the largest human-edited directory on the web.
Submit a Site - Open Directory Project - Become an Editor
Get a Domain Name:
.com .us .info
.org .in .name
.net .biz .asia