Home > Computers > Software > Operating Systems > Linux > Security > Documentation
ftp://ftp.cs.arizona.edu/reports/1994/TR94-34.ps
Discusses the possibility that crackers might generate and distribute a massive list of encrypted passwords.
http://en.tldp.org/HOWTO/Firewall-Piercing/
Tutorial on using ppp over telnet to do network stuff transparently through an Internet firewall. (François-René Rideau)
http://en.tldp.org/HOWTO/Firewall-HOWTO.html
Teaches the basics of firewall systems and give you some detail on setting up both a filtering and proxy firewall on a Linux based PC, by Mark Grennan.
https://www.seifried.org/lasg/
A security guide aimed at administrators and users, available online in Acrobat PDF format, by Kurt Seifried.
http://en.tldp.org/HOWTO/Bridge+Firewall.html
A tutorial on how to setup a bridge and a firewall with Linux, by Peter Breuer.
http://en.tldp.org/HOWTO/IPCHAINS-HOWTO.html
Describes how to obtain, install and configure the enhanced IP firewalling chains software for Linux, and how they might be used, by Paul Russell.
http://en.tldp.org/HOWTO/Security-HOWTO/
Security issues that face the administrator, security philosophy, examples of how to secure the system from intruders.
http://scrye.com/~kevin/lsh/t1.html
General overview of security issues that face the administrator of Linux systems. It covers general security philosophy and a number of specific examples of how to better secure your Linux system from intruders.
http://www.windowsecurity.com/whitepapers/unix_security/
Network Security Library has links to many UNIX (and, especially, Linux) security articles on host hardening, security admin guides, and special purpose hardening tips.
http://www.ciphersbyritter.com/GLOSSARY.HTM
Hyperlinked definitions and discussions of many cryptographic, mathematics, logic, statistics, and electronics terms used in cipher construction and analysis.
http://en.tldp.org/HOWTO/Secure-POP+SSH.html
Explains how to set up secure POP connections using ssh, by Manish Singh.
http://www.eng.auburn.edu/users/doug/nis.html
Provides a checklist on how to secure UNIX/Linux NIS (formerly YP) services in an intranet environment.
http://www.fiveanddime.net/ss/secureserver.html
Setting up a secure Linux server using RedHat and the Linux From Scratch system.
http://www.crypt.gen.nz/selinux/faq.html
A technical FAQ for the NSA SELinux project, which covers installation and implementation issues.
http://yolinux.com/TUTORIALS/LinuxTutorialInternetSecurity.html
This tutorial covers the installation and use of hacker protection software such as Portsentry, tripwire, ssh. It also covers configuration and administration steps to make a Linux server secure against hackers.
Home > Computers > Software > Operating Systems > Linux > Security > Documentation
Thanks to DMOZ, which built a great web directory for nearly two decades and freely shared it with the web. About us