Archive for the 'Security' Category

SnortAlog : IDS/IPS and Firewall log Analyzer

Tuesday, May 20th, 2008

open source software that does firewall log analisys, stats and reporting

Cisco ASA and PIX Firewall Logging > Analyzing Firewall Logs

Tuesday, May 20th, 2008

notes about logging and long analyzing on cisco netsec devices (pix/asa)

Encrypted Root LVM | HowtoForge – Linux Howtos and Tutorials

Thursday, May 15th, 2008

Article shows how to encrypt LVM physical voulme partition.

forum.opennet.ru – (comment #32) iptables port knocking rule to guard SSH | Для открытия порта SSH на host необходимо послать UDP пакеты на несколько порытов

Thursday, May 15th, 2008

# [RU] Для открытия порта SSH на host необходимо выполнить команды с удаленного хоста

storm-leet08.pdf (application/pdf Object) Measurements and Mitigation of Peer-to-Peer-based Botnets:

Friday, April 25th, 2008

Ksplice: Rebootless Linux kernel security updates

Thursday, April 24th, 2008

new way (hopefully will be mainstream soon) to apply updates to linux kernel”on the fly”, i.e w/out need to reboot. The system is more or less a hack at this moment.

malware_biz.pdf (application/pdf Object)

Wednesday, April 16th, 2008

awesome paper about business of spam/malware/etc, kinda scary

Matasano Chargen » This New Vulnerability: Dowd’s Inhuman Flash Exploit

Wednesday, April 16th, 2008

detalied description about Flash vuln that was used to vin a recent hack contest (where vista and mac were hacked )

:String based network filtering with iptables on 2.6.x kernels

Thursday, March 13th, 2008

basically the Subj. You need 2.6.18.x to play around

Role-based access control in SELinux

Thursday, March 13th, 2008

example how to configure access using SELinux on Fedora 8