Find the answer to your Linux question:
Page 64 of 87 FirstFirst ... 14 54 60 61 62 63 64 65 66 67 68 74 ... LastLast
Threads 1261 to 1280 of 1724

Forum: Security

Post here for help with Linux security issues: antivirus, firewalls, encryption, vulnerabilities, etc

  1. Sticky Thread Sticky: A short guide to Linux security

    Here at we are often asked about the potential threat of a virus or malware attack. This short guide is designed to answer some of...

    Started by fingal, 02-25-2006
    • Replies: 1
    • Views: 70,725
    01-11-2010 Go to last post
  1. Linux secure log

    I found that message in my /var/log/secure file: Accepted password for user-name from port 50445 ssh2 The user-name is...

    Started by shuttler, 01-25-2006
    • Replies: 3
    • Views: 11,045
    02-13-2006 Go to last post
  2. proxies

    im really new to proxies (and just about everything else) and im looking them up on google. could anyone please help supplement / explain what im...

    Started by whisker, 02-11-2006
    • Replies: 1
    • Views: 1,411
    02-13-2006 Go to last post
  3. Exclamation Passwords without the encoding

    I have Linux Fedora Core 4. i will truely appreciate if someone can answer these questions.. Firstly in which file the passwords are writen in ?...

    Started by GiluR_101, 01-14-2006
    • Replies: 2
    • Views: 1,140
    02-12-2006 Go to last post
  4. VPN Configuration

    Hi, Can anyone please guide me how to configure and maintain VPN in linux? I'm using RHEL 3.0 ES. Waiting for response. Thanks , Deepak

    Started by Deepak.kpadhi, 01-04-2006
    • Replies: 2
    • Views: 3,789
    02-08-2006 Go to last post
  5. help with proxies/filtering

    Sorry, newb has read 95% of all the squid and webfiltering howtos but can't figure out how to put it together IN CONTEXT. Yes I can change the port...

    Started by Trio3b, 02-08-2006
    • Replies: 0
    • Views: 959
    02-08-2006 Go to last post
  6. System penetration

    At a uni job fair I was advised by one of the recruiters to investigate penetration testing, most specifically aimed at Windows Server 2003. Can...

    Started by jimbaloo, 01-28-2006
    • Replies: 2
    • Views: 2,090
    01-28-2006 Go to last post
  7. PAM - only allow domain group members to log on via ssh?

    Hi, I want to allow only one group member from my domain to log in to my gentoo box. Having got the group id (15020), with my uderstanding of...

    Started by humbletech99, 01-24-2006
    • Replies: 0
    • Views: 3,319
    01-24-2006 Go to last post
  8. Unhappy Intrusion Detection System.

    Hi, Iam an novice to the linux. Iam assigned an project of designing an intrusion detection system in linux as a part of my undergraduate education....

    Started by nethunter, 12-28-2005
    • Replies: 2
    • Views: 1,297
    01-17-2006 Go to last post
  9. How to prevent Linux for prompting for new passwords?

    When I booted up Mandriva 2006.0 yesterday, it started in graphical mode, runlevel 5 (not the way I'd had it set up) and acted as though it was going...

    Started by Seren, 01-08-2006
    • Replies: 3
    • Views: 1,193
    01-15-2006 Go to last post
  10. Granting SSH access to a Ruby on Rails user

    I installed Rails and Rubygems on a web server for a customer who wants to install a Ruby on Rails application that he developped. He needs SSH...

    Started by calande, 01-12-2006
    • Replies: 0
    • Views: 1,409
    01-12-2006 Go to last post
  11. Dynamic password project

    Hi folks, Is there "dynamic password" project on Open Source? Not found on Freshmeat. Sourceforge seems not working for the time being. ...

    Started by satimis, 01-11-2006
    • Replies: 2
    • Views: 1,330
    01-12-2006 Go to last post
  12. Question How does ssh exactly work??

    Ok, I kinda got myself confused. This is how it is: I have 2 PCs, both have ssh installed. I know for sure that on the linux machine i have ssh...

    Started by Kane274, 01-11-2006
    • Replies: 3
    • Views: 22,664
    01-12-2006 Go to last post
  13. IP filters or MAC filters

    For controlling access to the internet what's more secure MAC filters or IP filtering? Or are they roughly the same. This is for a wireless router.

    Started by ThoughtVelocity, 01-08-2006
    • Replies: 5
    • Views: 5,142
    01-11-2006 Go to last post
  14. my friend's website is virus infected with this code

    All the files at one of my friend's website is virus infected, it has inserted following code in it. <? echo...

    Started by AjiNIMC, 01-03-2006
    • Replies: 2
    • Views: 5,533
    01-06-2006 Go to last post
  15. log analysis tips needed..

    i analyse the daily PIX logs using fwanalog. It takes a lot of time but the result is really good and easy to parse. But since i am new to security...

    Started by Punter, 12-26-2005
    • Replies: 2
    • Views: 1,319
    01-04-2006 Go to last post
  16. /etc on seperate partition

    Hi, Is it possible to mount the /etc directory on a seperate partition? Ideally, I want that partition on a USB pen drive that it in read-only...

    Started by helpmhost, 12-21-2005
    • Replies: 5
    • Views: 2,009
    12-30-2005 Go to last post
  17. Question Can LinuxShield identify known rootkits

    I understand the difference between a rootkit and a virus, however my customer is in need of virus protection for their linux based systems. I...

    Started by meiser, 12-29-2005
    • Replies: 2
    • Views: 1,298
    12-29-2005 Go to last post
  18. Firewall Specifics

    ###Basically here's a summary of what i want to achieve by using the firewall:-> HTTP port 80 is open for everyone in my network. Some...

    Started by achillies, 12-26-2005
    • Replies: 1
    • Views: 1,635
    12-29-2005 Go to last post
  19. Blocking Yahoo Messenger

    Hi guys, I want to block only yahoo messenger in squid proxy with out efecting other sites. Can anyone please help me out? Thanks...

    Started by Deepak.kpadhi, 12-19-2005
    • Replies: 2
    • Views: 7,205
    12-28-2005 Go to last post
  20. Controlling Internet Access

    Hi guys, In my position at work, I have 'inhereted' an Internet Gateway which is based on Debian. It has some great tools on it such as WonderShaper...

    Started by Johnny_Summers, 10-20-2005
    • Replies: 5
    • Views: 1,368
    12-28-2005 Go to last post

Thread Display Options

Use this control to limit the display of threads to those newer than the specified time frame.

Allows you to choose the data by which the thread list will be sorted.

Order threads in...

Note: when sorting by date, 'descending order' will show the newest results first.

Icon Legend

Contains unread posts
Contains unread posts
Contains no unread posts
Contains no unread posts
More than 15 replies or 150 views
Hot thread with unread posts
More than 15 replies or 150 views
Hot thread with no unread posts
Closed Thread
Thread is closed
Thread Contains a Message Written By You
You have posted in this thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts