Firewall - Page 13
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
As of 2.4, ipchains is a thing of the past. The replacement for ipchains is Netfilter's iptables. What does this mean to the end user? Typically it means little beyond the fact that suddenly their ipmasq script doesn't work. So, for . . .
Richard Morrell and Lawrence Manning, co-authors of the SmoothWall Open Source firewall project, have joined SlashTCO Limited, the UK Open Source services and information provider. Richard and Lawrence will continue to work on a number of Open Source projects, including . . .
Lately, hackers have discovered they can sneak into your computer by sending look-alike imposters to the firewall's gate. The hackers simply rename a snooping program or a virus so that it has the same file name as your browser or e-mail . . .
This article will look at ways for users to get more out of that faithful but somewhat dull firewall. In particular, we will look at traffic shaping, a technique that prevents high-bandwidth traffic like Napster from making other Internet applications, such . . .
Ron Trepanier knew that the Internet could be a dangerous place, but it wasn't until he installed a personal firewall that he realized his home computer was coming under daily attack. The mechanical engineer, who lives outside Toronto, recently documented 30 . . .
While firewall vendors espouse the virtues or their security solutions, others believe that even the most technologically advanced firewall can't offer companies all of the protection they need to ensure that data is safe from both external and internal threats. . . .
Scott Thomason writes: "In this article, I discuss the origin and basic structure of IP in enough detail to continue on with an exploration of the fundamentals of packet filtering firewalls. An extensive sample firewall showing the use of the Linux . . .
It's one thing to rush an application to market without thinking about security. It's another to rush a security application to market. But that's what's happened with several personal firewalls--a product category that was a virtual nonentity . . .
For a couple of weeks now some of you may have been seeing what looks like a ping scan from many hosts to your nameservers. Joe Stewert gave a very good explination of why this is happening in a recent . . .
Despite its relatively secure status when compared to some other operating systems, Linux is still somewhat problematic to deal with, especially as the userbase drifts more and more from experienced technical hands to hobbyists and less experienced users out to try . . .
Here's a pretty good guide on the most common things you can do to block many of the most commonly exploitable services from entering/leaving your network. "The following 11 sections for this assignment will be demonstrated using a Redhat Linux 6.1 . . .
In this article I cover some of the design decisions that have to be made before creating a firewall, from architecture to various decisions that should be made. A firewall is a device that separates and protects your network, in most . . .
Firewalls are not new; but high-performance firewalls are. Historically, firewalls used software to examine every packet and then make the decision to forward or drop the packet. This made them slow. When administrators placed them in line with low-speed WAN . . .
This chapter describes a variety of ways to put firewall components together, and discusses their advantages and disadvantages. We'll tell you what some appropriate uses are for each architecture. The simplest firewall architectures have a single object that acts as . . .
Lewis talked at length about SecureWorks' latest offering, iSensor. A Linux-based stateless firewall product has a significant twist: remote monitoring done at the SecureWorks data center in Atlanta. SecureWorks has done a considerable amount of work in real-time intrusion detection, adding . . .
Ipchains is a packet-filtering firewall package. You can findan RPM of Ipchains in RedHat/RPMS in the latest PC Quest RedHat CD. First youhave to check whether the Linux kernel supports Ipchains. For this, look for afile named ip_fwchains in /proc/net. If . . .
In this three-part series, you'll learn to install and configure a Linux server and firewall. Part 1 covered selecting a secure Linux distribution and installing it. Part 2 covered the reassignment of services provided by the old firewall which the authors . . .
Squid is a proxy caching server for HTTP/FTP requests. It caches data off the net on your local network. So the next time the same data is being accessed, whether it is html or a gif, it gets served up . . .
I have encountered several companies with big web businesses who failed to install a single firewall in their premises. After several days and weeks or persuasion, some heeded my advice to install firewalls, while some remained complacent about their 'armoured servers . . .
In this three-part series, you'll learn to install and configure a Linux server and firewall. Part 1 covered the selection and installation of a secure Linux distribution. Part 2 covers the reassignment of the services provided by the old firewall the . . .