Call for papers

SecurityFocus ( ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to:

Infocus: Unix (Page 5 of 12)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
Filtering E-Mail with Postfix and Procmail, Part One
This article is the first of three articles that will help systems administrators to implement SMTP daemons and local mail delivery agents to filter out unwanted e-mails before they arrive in the end-users' in-box. Specifically, this series will examine the use of Postfix and Procmail to eliminate spam before it hits the client.
By: Brian Hatch 2002-06-17

PortSentry for Attack Detection - Part Two
This is the second in a two-part series on PortSentry. The first part discussed how PortSentry works to identify attacks, as well as what types of attacks it identifies. This article will focus on building, installing, and operating PortSentry. The focus here will be on the various configuration options available for PortSentry, as well as some of the benefits and drawbacks of those options.
By: Ido Dubrawsky 2002-05-29

PortSentry for Attack Detection, Part One
Portsentry is an attack detection tool developed by Psionic Technologies. This article is the first of a two-part series that will describe in detail how Portsentry works from both a theoretical and a technical point of view.
By: Ido Dubrawsky 2002-05-15

Restricting UNIX Users
This article will discuss ways in which security administrators can limit what users are able to do on a UNIX system, with a particular focus on Linux. Both local and remote users will be considered. However, restricting root users will not be discussed in this article.
By: Anton Chuvakin 2002-05-01

Openwall: Improving Security with the Openwall Patch
This article will examine the OpenwallLinux kernel Patch, one of the best-known kernel hardening patches. It will explain how to install the patch and will examine its main features.
By: Zeshan Ghory 2002-04-17

IPCop: An Overview
IPCop is a cut-down Linux distribution that is intended to operate as a firewall, and only as a firewall. It has some advanced firewalling features, including VPNs using IPSec. This article describes the set-up and use of IPCop, and contains a few comments about its features.
By: David "Del" Elson 2002-03-13

Grsecurity is a suite of patches (distributed as a single patch file) for the Linux kernel that are an attempt to improve the security of a Linux system. Grsecurity is based on a port of some previous patches for the Linux 2.2 kernel, including Openwall and PaX, which have never been ported to the 2.4 kernel. Grsecurity provides some updates to these patches and has been ported to the Linux 2.4 kernel. This article will offer a brief overview of grsecurity.
By: David "Del" Elson 2002-02-28

Linux Kernel Hardening
This article will cover the issues of Linux hardening, with a specific focus on kernel hardening and its use on production systems. Several kernel-hardening approaches and their usability will be analyzed.
By: Anton Chuvakin 2002-01-23

IPTables Linux firewall with packet string-matching support
Linux firewalling code has come a long way since the time ipfwadm was introduced in kernel version 1.2.1 in 1995. Ipfwadm enabled standard TCP/IP packet filtering features such as filtering by source/target addresses and port numbers. Then, in early 1999, when the first stable 2.2.0 kernel was released, firewalling code was replaced with new ipchains-controlled code. New features included support for chains of rules, fragmentation handling, better network address translation (NAT) supp...
By: Anton Chuvakin 2001-12-31

A Simple Oracle Host-Based Scanner
As with any large software package, the default installation of Oracle does not provide for the most secure system out of the box. Indeed, some aspects of the default installation are remarkably insecure. This paper will explore the scanning of an installation of Oracle's RDBMS and, in doing so, will investigate some common security deficiencies.
By: Pete Finnigan 2001-12-13

Unix (Page 5 of 12)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >


Privacy Statement
Copyright 2010, SecurityFocus