Security

Want to support HowtoForge? Become a subscriber!
 

Using IP Service Object In Firewall Builder

Using IP Service Object In Firewall Builder

This article continues the series of articles on Fireall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article demonstrates how you can work with IP Service object in Firewall Builder.

How To Configure SSH Keys Authentication With PuTTY And Linux Server In 5 Quick Steps

How To Configure SSH Keys Authentication With PuTTY And Linux Server In 5 Quick Steps

This tutorial explains how you can replace password-based SSH authentication with key-based authentication which is more secure because only the people that own the key can log in. In this example, we're using PuTTY as our SSH client on a Windows system.

Using Network, Address Range Objects And Groups Of Addresses Objects In Firewall Builder

Using Network, Address Range Objects And Groups Of Addresses Objects In Firewall Builder

This article continues the series of articles on Fireall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article demonstrates how you can work with Network, Address Range and Groups of Objects objects in Firewall Builder.

Using IP And MAC Address Objects In Firewall Builder

Using IP And MAC Address Objects In Firewall Builder

This article continues the series of articles on Fireall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article demonstrates how you can work with IPv4, IPv6 and MAC Address objects in Firewall Builder.

Using The Interface Object In Firewall Builder

Using The Interface Object In Firewall Builder

This article continues the series of articles on Fireall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article demonstrates how you can work with Interface objects in Firewall Builder.

Using The Host Object In Firewall Builder

Using The Host Object In Firewall Builder

This article continues the series of articles on Fireall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article demonstrates how you can work with Host objects in Firewall Builder.

Using Firewall Object In Firewall Builder

Using Firewall Object In Firewall Builder

Firewall Builder supports variety of object types, both simple such as address, network, host, or IP, TCP, UDP and ICMP services, as well as more sophisticated such as Firewall, Host, Address table, DNS name, User service. Firewall object is central to the program and is in the focus of this article.

Two-Factor Authentication For Google Apps For Your Domain Using SSO/SAML And WiKID Strong Authentication Server

Two-Factor Authentication For Google Apps For Your Domain Using SSO/SAML And WiKID Strong Authentication Server

Everybody loves GMail. With Google Apps for you Domain, you can use GMail with your own domain, allowing organizations to outsource their email - and the requisite anti-spam filtering to Google. Webmail is very convenient, but for frequent travelers and those who use public wifi, it can be quite dangerous. Logging in from a kiosk or shared computer is a sure way to get your username and password stolen by a keystroke logger. While cloud services are great, maintaining security is tough. In this document, we will add two-factor authentication to Google Apps for Your Domain using their SSO/SAML protocol and the open-source version of the WiKID Strong Authentication server.

Creating A Fully Encrypted Para-Virtualised Xen Guest System Using Debian Lenny

Creating A Fully Encrypted Para-Virtualised Xen Guest System Using Debian Lenny

This document explains how to set up a fully encrypted para-virtualized XEN instance. In this howto, the host system is running Debian Etch, while the guest system to be installed will be using Debian Lenny. If you are concerned about your privacy, you might want to consider using hard disk encryption to protect your valuable private data from spying eyes. Usually, the easiest way would be to use your distribution's installer to set up a fully encrypted system; I think most recent Linux distributions support this. However, when you are using XEN to provide virtualization, there are situations where you might not want to encrypt your whole computer with all guest instances, but instead only encrypt one OS instance. This howto will deal with exactly this situation. It assumes that the XEN host system is already up and running.

How To Install The WiKID Strong Authentication System On Slackware

How To Install The WiKID Strong Authentication System On Slackware

Tested on Slackware 12.2, 2.6.28.7-grsec, PostgreSQL 8.3.6, postgresql-8.3-604.jdbc4. Note: Some of the configuration scripts included with WiKID are designed for Redhat and friends, several steps in this guide focus on modifying these scripts for Slackware as well as working around some of them.

first page
previous page
...
18
...
next page
last page
XML feed
"Facebook" is a registered trademark of Facebook, Inc. All rights reserved.