Enter Domain Name:

Top / Computers / Software / Operating_Systems / Linux / Security / Documentation /

A Short History of Cryptography
A brief historical analysis of the management of cryptography.
http://www.all.net/books/ip/Chap2-1.html
All.net  ~   Site Info   Whois   Trace Route   RBL Check  
Linux Firewall Howto
Firewall HOWTO collection, ids, nids, hardening, penetration testing, auditing
http://www.linux-sec.net/
Linux-sec.net  ~   Site Info   Whois   Trace Route   RBL Check  
Introduction to Linux Networking and Security
Brief introduction to the IP networking services, how to configure them, and how to set up a relatively secure Linux workstation. Published in ACM Crossroads, the ACM student magazine.
http://www.acm.org/crossroads/xrds6-1/linuxsec.html
Acm.org  ~   Site Info   Whois   Trace Route   RBL Check  
A Simple Scheme to Make Passwords Based on One-Way Functions Much Harder to Crack
Discusses the possibility that crackers might generate and distribute a massive list of encrypted passwords.
ftp://ftp.cs.arizona.edu/reports/1994/TR94-34.ps
Arizona.edu  ~   Site Info   Whois   Trace Route   RBL Check  
YoLinux: Internet Server Security HowTo and Tutorial
This tutorial covers the installation and use of hacker protection software such as Portsentry, tripwire, ssh. It also covers configuration and administration steps to make a Linux server secure against hackers.
http://yolinux.com/TUTORIALS/LinuxTutorialInternetSecurity.html
Yolinux.com  ~   Site Info   Whois   Trace Route   RBL Check  
Ritter's Crypto Glossary and Dictionary of Technical Cryptography
Hyperlinked definitions and discussions of many cryptographic, mathematics, logic, statistics, and electronics terms used in cipher construction and analysis.
http://www.ciphersbyritter.com/GLOSSARY.HTM
Ciphersbyritter.com  ~   Site Info   Whois   Trace Route   RBL Check  
Securing NIS
Provides a checklist on how to secure UNIX/Linux NIS (formerly YP) services in an intranet environment.
http://www.eng.auburn.edu/users/doug/nis.html
Auburn.edu  ~   Site Info   Whois   Trace Route   RBL Check  
Setting up a secure Linux server
Setting up a secure Linux server using RedHat and the Linux From Scratch system.
http://www.fiveanddime.net/ss/secureserver.html
Fiveanddime.net  ~   Site Info   Whois   Trace Route   RBL Check  
UnOfficial SELinux FAQ
A technical FAQ for the NSA SELinux project, which covers installation and implementation issues.
http://www.crypt.gen.nz/selinux/faq.html
Crypt.gen.nz  ~   Site Info   Whois   Trace Route   RBL Check  
Firewalling and Proxy Server HOWTO
Teaches the basics of firewall systems and give you some detail on setting up both a filtering and proxy firewall on a Linux based PC, by Mark Grennan.
http://en.tldp.org/HOWTO/Firewall-HOWTO.html
Tldp.org  ~   Site Info   Whois   Trace Route   RBL Check  
 


Page 1/2« Previous12Next »