Linux Tutorials on the topic “security”
-
Using IP Service Object In Firewall Builder
Author: vkfwb • Tags: security • Comments: 0Using IP Service Object In Firewall Builder This article continues the series of articles on Fireall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article demonstrates how you can work with IP Service object in Firewall Builder.
-
How To Configure SSH Keys Authentication With PuTTY And Linux Server In 5 Quick Steps
Author: EugenePik • Tags: linux, security • Comments: 25
How To Configure SSH Keys Authentication With PuTTY And Linux Server In 5 Quick Steps This tutorial explains how you can replace password-based SSH authentication with key-based authentication which is more secure because only the people that own the key can log in. In this example, we're using PuTTY as our SSH client on a Windows system.
-
Using Network, Address Range Objects And Groups Of Addresses Objects In Firewall Builder
Author: vkfwb • Tags: security • Comments: 0Using Network, Address Range Objects And Groups Of Addresses Objects In Firewall Builder This article continues the series of articles on Fireall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article demonstrates how you can work with Network, Address Range and Groups of Objects objects in Firewall Builder.
-
-
Using IP And MAC Address Objects In Firewall Builder
Author: vkfwb • Tags: security • Comments: 0Using IP And MAC Address Objects In Firewall Builder This article continues the series of articles on Fireall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article demonstrates how you can work with IPv4, IPv6 and MAC Address objects in Firewall Builder.
-
Using The Interface Object In Firewall Builder
Author: vkfwb • Tags: security • Comments: 0Using The Interface Object In Firewall Builder This article continues the series of articles on Fireall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article demonstrates how you can work with Interface objects in Firewall Builder.
-
Using The Host Object In Firewall Builder
Author: vkfwb • Tags: security • Comments: 0Using The Host Object In Firewall Builder This article continues the series of articles on Fireall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article demonstrates how you can work with Host objects in Firewall Builder.
-
Using Firewall Object In Firewall Builder
Author: vkfwb • Tags: desktop, security • Comments: 0Using Firewall Object In Firewall Builder Firewall Builder supports variety of object types, both simple such as address, network, host, or IP, TCP, UDP and ICMP services, as well as more sophisticated such as Firewall, Host, Address table, DNS name, User service. Firewall object is central to the program and is in the focus of this article.
-
Two-Factor Authentication For Google Apps For Your Domain Using SSO/SAML And WiKID Strong Authentication Server
Author: nowen • Tags: security • Comments: 0Two-Factor Authentication For Google Apps For Your Domain Using SSO/SAML And WiKID Strong Authentication Server Everybody loves GMail. With Google Apps for you Domain, you can use GMail with your own domain, allowing organizations to outsource their email - and the requisite anti-spam filtering to Google. Webmail is very convenient, but for frequent travelers and those who use public wifi, it can be quite dangerous. Logging in from a kiosk or shared computer is a sure way to get your username and password stolen by a keystroke logger. While cloud services are great, maintaining security is tough. In this document, we will add two-factor authentication to Google Apps for Your Domain using their SSO/SAML protocol and the open-source version of the WiKID Strong Authentication server.
-
How To Install The WiKID Strong Authentication System On Slackware
Author: nowen • Tags: linux, security • Comments: 0
How To Install The WiKID Strong Authentication System On Slackware Tested on Slackware 12.2, 2.6.28.7-grsec, PostgreSQL 8.3.6, postgresql-8.3-604.jdbc4. Note: Some of the configuration scripts included with WiKID are designed for Redhat and friends, several steps in this guide focus on modifying these scripts for Slackware as well as working around some of them.
-
Using Built-in Policy Installer in Firewall Builder
Author: vkfwb • Tags: desktop, security • Comments: 0Using Built-in Policy Installer in Firewall Builder This article demonstrates how Firewall Builder can help you automate the process of deployment and activation of the generated firewall configuration. After firewall configuration has been generated by one of the policy compilers and saved in a file on disk in the format required by the target firewall, it needs to be transferred to the firewall machine and activated. This function is performed by the component we call "Policy Installer" which is part of the Firewall Builder GUI.