Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Using the 'snort' Intrusion Detection System

Linux Linux 2.6: Compiling and Installing
Post date: April 15, 2005, 18:04 Category: System Views: 55
Tutorial quote: We'll look at the process of compiling and installing a new kernel safely, without overwriting the existing kernel.

You can install as many kernels as you like on a Linux system, and select the one you want to run at boot time. This makes it easy to test different kernels, and different kernel configurations, with particular sets of hardware or applications. The wise network admin always tests new kernels before running them on production machines.
Mepis Mepis + apt = Working On Easy Street
Post date: April 13, 2005, 15:04 Category: System Views: 103
Tutorial quote: My reasoning for combining the traditional Debian apt command with Mepis was speed and efficiency. Also, in the fine tradition of open source, I could choose to use the command line instead of the Kpackage or Mepis System Center package management screen. This is a good way to learn about Debian systems that builds confidence for new users right off the bat.

Let's see how apt works with Mepis.
Linux Howto install the base Linux system onto a USB thumbdrive with the root partition encrypted
Post date: April 20, 2006, 08:04 Category: System Views: 23
Tutorial quote: This howto will explain how to install a very basesystem onto a USB thumbdrive with the root partition encrypted. It includes support for cryptsetup-luks, and udev.
Linux Using iptables to rate-limit incoming connections
Post date: December 16, 2005, 17:12 Category: Network Views: 74
Tutorial quote: There are times when you have to allow arbitary incoming connections, when you are travelling for example.

In these situations you can open up your system to allow incoming connections and be the target of a dictionary attack - literally a machine trying to connect and login over and over again using usernames and passwords from a dictionary.

In this situation you can create a collection of firewalling rules which will deny access from remote clients who attempt to connect "too many" times.
Slax Creating a custom live CD with Slax
Post date: June 15, 2005, 12:06 Category: Miscellaneous Views: 238
Tutorial quote: Live CDs can be useful for testing an operating system or performing special operations -- assuming there's a live CD distro that does what you need. Unfortunately, if you are running a special application, especially one you wrote yourself, no live CD will be tailored exactly to your needs. But creating you own live CD is easier than you might think, with Slax and its easy customization utility MySlax Creator.
Unix+clones Version Control with Subversion (Online book)
Post date: April 27, 2005, 23:04 Category: Software Views: 53
Tutorial quote: This is the online home of Version Control with Subversion, a free book about Subversion, a new version control system designed to supplant CVS. As you may have guessed from the layout of this page, this book is published by O'Reilly Media.
Debian PostgreSQL Database Server Configuration in Debian
Post date: March 24, 2006, 12:03 Category: Software Views: 16
Tutorial quote: PostgreSQL is a fully featured object-relational database management system. It supports a large part of the SQL standard and is designed to be extensible by users in many aspects. Some of the features are: ACID transactions, foreign keys, views, sequences, subqueries, triggers, user-defined types and functions, outer joins, multiversion concurrency control. Graphical user interfaces and bindings for many programming languages are available as well.
Unix+clones Emulating an OS with qemu
Post date: May 22, 2005, 04:05 Category: Emulation Views: 86
Tutorial quote: When you want to emulate a PC with a complete operating system on your computer, the most heard answer would be VMWare. Sure, for Linux, there is wine, but that package is targeted to handle only window$ and not all programs are supported. No, I'm talking about simulating a complete OS on a virtual PC with virtual hardware.

Although VMware does an almost perfect job at it, it isn't free software. Time to see what the Open Source community has to offer. That's when I stumbled upon qemu. Let's have a look at the possibilities.
Linux Windows Linux DualBoot Tutorial
Post date: April 1, 2006, 00:04 Category: Installing Views: 12
Tutorial quote: This tutorial was written to help set up a dual boot on a SATA drive but it will also work for PATA so continue forward and I will let you know if you need to skip something. In order to have a fully functional dual boot system it is preferred that Windows be loaded first. After that you can load Linux and easily dump the boot configuration on Windows NTLDR file (comparable to Linux boot file).
Linux Linux stateful firewall design
Post date: April 12, 2005, 13:04 Category: Network Views: 40
Tutorial quote: This tutorial shows you how to use netfilter to set up a powerful Linux stateful firewall. All you need is an existing Linux system that's currently using a Linux 2.4.x or 2.6.x kernel. A laptop, workstation, router or server with at a Linux 2.4.x or 2.6.x kernel will do. You should be reasonably familiar with standard network terminology like IP addresses, source and destination port numbers, TCP, UDP and ICMP, etc. By the end of the tutorial, you'll understand how Linux stateful firewalls are put together and you'll have several example configurations to use in your own projects.