Search
The Directory
The Web
for
Home
>
Computers
>
Software
>
Operating Systems
>
Linux
>
Security
>
Documentation
New!
Submit a site
whatUseek Collection Sites
(
submit a site
)
:
Give your site great placement in this category in as little as two business days!
whatUseek Directory Site Listings:
A Short History of Cryptography
- A brief historical analysis of the management of cryptography.
A Simple Scheme to Make Passwords Based on One-Way Functions Much Harder to Crack
- Discusses the possibility that crackers might generate and distribute a massive list of encrypted passwords.
Firewall Piercing mini-HOWTO
- Tutorial on using ppp over telnet to do network stuff transparently through an Internet firewall. (François-René Rideau)
Firewalling and Proxy Server HOWTO
- Teaches the basics of firewall systems and give you some detail on setting up both a filtering and proxy firewall on a Linux based PC, by Mark Grennan.
Introduction to Linux Networking and Security
- Brief introduction to the IP networking services, how to configure them, and how to set up a relatively secure Linux workstation.
Linux Administrator's Security Guide
- A comprehensive security guide aimed at administrators and users, available online in Acrobat PDF format, by Kurt Seifried.
Linux Bridge+Firewall Mini-HOWTO
- A tutorial on how to setup a bridge and a firewall with Linux, by Peter Breuer.
Linux Firewall Howto
- Firewall HOWTO collection, ids, nids, hardening, penetration testing, auditing
Linux IPCHAINS-HOWTO
- Linux ipchains guide including details on firewalling, masqerading, and port forwarding.
Linux Security
- General overview of security issues that face the administrator of Linux systems. It covers general security philosophy and a number of specific examples of how to better secure your Linux system from intruders.
Linux Security HOWTO
- Security issues that face the administrator, security philosophy, examples of how to secure the system from intruders.
Ritter's Crypto Glossary and Dictionary of Technical Cryptography
- Hyperlinked definitions and discussions of many cryptographic, mathematic, logic, statistics, and electronics terms used in cipher construction and analysis.
Secure POP via SSH mini-HOWTO
- Explains how to set up secure POP connections using ssh, by Manish Singh.
Security Breaches: Five recent incidents at Columbia University
- Provides an internal look at breaches performed on various Linux operating systems.
Using Term to Pierce an Internet Firewall
- Tutorial on using 'term' to do network stuff through a TCP firewall that you're not supposed to be able to, by Barak Pearlmutter.
Help build the largest human-edited directory on the web.
Submit a Site
-
Open Directory Project
-
Become an Editor
About
Help
Content Filter
Terms
Privacy Policy
© 2018
whatUseek