* AIDE project page @ freshmeat.net
* AIDE project page @ sourceforge.net
* AirSnort Project Page
* AntiVirus ) Avast! Linux Home Edition
* AntiVirus ) AVG ) for Linux
* AntiVirus ) AVG ) Free Forum
* AntiVirus ) AVG ) TCP Server
* AntiVirus ) Bitdefender
* AntiVirus ) ClamAV
* AntiVirus ) ClamAV ) Installation From Source Step-By-Step
* AntiVirus ) Clam AV ) project page @ SourceForge.net
* AntiVirus ) F-Prot ) Download Page
* AntiVirus ) F-Prot ) FTP Download Directory
* AntiVirus ) F-Prot ) Home
* AntiVirus ) KlamAV (Frontend for ClamAV)
* AntiVirus ) KlamAV Project Page
* AntiVirus ) Panda Software
* AntiVirus ) QtFprot (Frontend for F-Prot)
* AntiVirus ) Scan with F-Prot via desktop (Requires F-Prot)
* AntiVirus ) Security Information Center Virus Information @ f-secure.com
* AntiVirus ) Virus Information @ securityfocus.com
* AntiVirus ) Xfprot (Frontend for F-prot)
* AppArmor - Novell AppArmor - apparmor @ forge.novell.com
* AppArmor @ openSUSE.org
* Arno's IPTABLES Firewall Script project page
* Article: "Anonymizing UNIX Systems"
* Article: "Anyone with a Screwdriver Can Break In!" "(Physical Security and Boot Security Issues in Linux)"
* Article: "Are Your Servers Secure?"
* Article: Assembly @ techbooksforfree.com
* Article: "Assessment of Access Control Systems" @ NIST.gov .PDF
* Article: "Assess system security using a Linux LiveCD"
* Article: "Automating system administration with ssh and scp Introduction" .PDF
* Article: "Bash History Functions"
* Article: "Bastille Linux: A Walkthrough" @ securityfocus.com
* Article: Checklists / Implementation Guides
* Article: "CLI Magic: Trojan Scan"
* Article: "Coding a Simple Packet Sniffer" LG #128
* Article: Computer Forensics Column @ porcupine.org
* Article: Computer insecurity @ wikipedia.org "describes the current battlefield of computer security exploits and defenses."
* Article: defenses @ wikipedia.org
* Article: "Detecting suspicious network traffic with psad"
* Article: "Enhance boot-time security with GRUB passwords"
* Article: "Ethernet MAC address spoofing in Linux"
* Article: exploits @ wikipedia.org
* Article: "Firewall Configuration Prerequisites"
* Article: "Firewall logging to MySQL - the quick and easy way" LG #121
* Article: "Foiling DNS Attacks"
* Article: Fort Knox for Linux @ newsforge.com 04/19/2005
* Article: Fort Knox for Linux @ Slashdot.org 04/19/2005
* Article: "Getting to grips with Linux Permissions" .PDF
* Article: "Guide to Computer Security Log Management" @ NIST.gov .PDF
* Article: "Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities" @ NIST.gov .PDF
* Article: "Hacks From Pax: Linux File & Directory Permissions Mistakes"
* Article: "Halt! Who Goes There?" "Access control lists are far more flexible than Linux permissions"
* Article: "Hardening the PAM framework"
* Article: "Hardening the TCP/IP stack to SYN attacks" @ securityfocus.com
* Article: "HNS - Linux Security - Is it Ready For The Average User?"
* Article: "How do I Tighten Security My System?"
* Article: "How to hide an entire filesystem" @ Linux.com 03/12/2007
* Article: "How to install a simple network gateway"
* Article: HOWTO The Home Network for Beginners @ Gentoo Linux Wiki
* Article: "Intruder Detection Checklist"
* Article: "Intruder Detection Checklist" @ CERT.org
* Article: "Intrusion Reporting"
* Article: "iptables: Creating an open source firewall"
* Article: "Killing Daemons!" "(Minimize Access Points to Secure Linux Boxes)"
* Article: "Kismet sniffs out Wi-Fi access"
* Article: "'Know Your Enemy': Everything you need to know about honeypots" September 27, 2004
* Article: Linux IPv6 HOWTO (en) @ tldp.org
* Article: Linux Network Admin Guide
* Article: Linux @ securityfocus.com
* Article: "Maybe I Should Be Afraid of Linux?"
* Article: MD5, about md5 @ wikipedia.org
* Article: "Network Intrusion Detection and Prevention?"
* Article: "Network monitoring with Cacti"
* Article: "Network monitoring with ngrep"
* Article: "Online Security Tools"
* Article: OpenSSH @ Gentoo Linux Wiki
* Article: "OpenSSH key management, Part 1" @ IBM.com
* Article: "OpenSSH key management, Part 2" @ IBM.com
* Article: "OpenSSH key management, Part 3" @ IBM.com
* Article: Parental control on the Linux desktop @ Alien's Wiki
* Article: Ports Associated with Known Vulnerabilities and Exploits
* Article: "Preparing your linux box for the Internet"
* Article: "Preventing SSH Dictionary Attacks With DenyHosts"
* Article: "Protecting Linux against automated attackers"
* Article: "Protect your applications with AppArmor" @ Linux.com
* Article: Secure computing @ wikipedia.org "article for an alternative approach, based on security engineering principles."
* Article: "Securing Linux" from IBM's developerWorks
* Article: "Security best practices for Red Hat and Fedora Core"
* Article: security engineering @ wikipedia.org
* Article: Security Glossary merged (ise.gmu.edu)
* Article: Security Glossary (sun.soci.niu.edu) "of Communications, Computer, Data, and Information Security Terms"
* Article: "Security Through Obscurity" Ain't What They Think"
* Articles: Firewalls @ securityfocus.com
* Article: "Shredding Access in the Name of Security" "Set UID Audits"
* Articles: IDS @ securityfocus.com
* Articles: Incidents @ securityfocus.com
* Articles: Internet/Network Security
* Articles: Jay Beale's Linux/UNIX Security Articles (bastille-linux.org)
* Articles: NIST Computer Security Special Publications
* Article: Snort - "Intrusion Detection With BASE And Snort"
* Articles: SANS' Information Security Reading Room "Featuring over 1428 original computer security white papers in 71 different categories"
* Articles: Sections At A Glance @ securityfocus.com
* Articles: Sniffers @ securityfocus.com
* Article: "Steps for Recovering from a UNIX or NT System Compromise" @ CERT.org
* Article: "Stupid, Stupid Protocols: Telnet, FTP, rsh/rcp/rlogin"
* Article: Tor (anonymity network) @ Wikipedia
* Article: Tor: documentation (tor.eff.org)
* Article: Tor : HOWTO Anonymity with Tor and Privoxy - Gentoo Linux Wiki
* Article: Tor: "How to Run a Secure Tor Server"
* Article: Tor : "How to Speak Anonymously in Public: A Hacker's Guide" @ wiki.noreply.org
* Article: Tor: "PreventingDnsLeaksInTor"
* Article: Tor: "TheOnionRouter/TorifyHOWTO"
* Article: Tor: "TorInChroot"
* Article: "Tripwire - The Only Way to Really Know..."
* Article: "UNIX Configuration Guidelines" @ CERT.org
* Article: "UNIX ownership and permissions provide for privacy and participation" @ IBM.com DeveloperWorks Library "Speaking UNIX, Part 4"
* Article: "UNIX Security Checklist v2.0 - Full Version" @ CERT.org
* Article: "Why Do I Have to Tighten Security on my System?" "(Why Can't I Just Patch?)"
* Article: xinetd, Controlling Access to Your Services with
* ASR Data - Computer Forensic Tools
* Bastille Linux
* Bastille Linux Project Page
* Cacti: The Complete RRDTool-based Graphing Solution
* C and C++ @ techbooksforfree.com
* chkrootkit : rootkit related links
* Coroner's Toolkit, The (TCT)
* Crypto-Gram Newsletter
* Darik's Boot and Nuke
* Darik's Boot and Nuke : Project Page
* Database @ techbooksforfree.com
* Debsecan "The debsecan program evaluates the security status of a host running the Debian operation system. It reports missing security updates and known vulnerabilities in the programs which are installed on the host."
* Ethereal "network protocol analyzer"
* Ettercap "is a suite for man in the middle attacks on LAN. It features sniffing of live connections, content filtering on the fly and many other interesting tricks."
* Firewall ) Article: "Firewalls and setting access policies" "Security Quick-Start HOWTO for Linux"
* Firewall ) FireFlier - A Project For Interactive Firewall Administration
* Firewall ) Firestarter
* Firewall ) Firestarter ) Article @ security.linux.com 01/03/2005
* Firewall ) Firestarter ) project page @ freshmeat
* Firewall ) Firestarter ) project page @ sourceforge
* Firewall ) Guarddog "a firewall configuration utility for Linux systems. Guarddog is aimed at two groups of users. Novice to intermediate users who are not experts in TCP/IP networking and security, and those users who don't want the hastle of dealing with cryptic shell scripts and ipchains/iptables parameters"
* Firewall ) m0n0wall
* Firewall ) Program Guard "allows the user of a Linux workstation to specify which application programs that are allowed TCP/IP connections to the Internet"
* Firewall ) Shorewall "The Shoreline Firewall, more commonly known as "Shorewall", is a high-level tool for configuring Netfilter"
* Firewall ) TuxGuardian "An application-based firewall"
* Fort Knox for Linux
* fwlogwatch project page at freshmeat
* fwlogwatch project page at SourceForge
* GRC.com's Shields Up! Online Web Based Security Test - Port Scanner
* hosts file, mvps add this list to your /etc/hosts file to block unwanted sites from your web browsing experience, including well known adbanner hosting sites, tracking sites, and much more. Tested and works well on Linux + updates are frequently posted
* Hosts file @ Wikipedia
* IPCop.org :: The bad packets stop here!
* IPMENU - Netfilter/IPtables Rule Editor "a user interface to Netfilter/iptables and Linux policy routing or traffic control, allowing you to edit firewall rules and configure the firewall to "mark" packets for policy routing or for class based queueing (CBQ)"
* IPTraf "An IP Network Monitor"
* Java @ techbooksforfree.com
* John the Ripper
* Kismet Project Page
* Labrea Honeypot software
* Linux @ techbooksforfree.com
* Logfinder - eff.org "Helps Eliminate Unwanted Logging of Personal Data"
* LQ Security references (lots of links!) @ linuxquestions.org :
* md5deep - project page
* MIDAS "a cross platform Monitoring and NIDS server."
* NCovert project page
* nessus.org "a free, powerful, up-to-date and easy to use remote security scanner"
* Networking @ techbooksforfree.com
* Network Security Toolkit (NST)
* Network Security Tools Project Page
* ngrep - network grep
* ngrep project page
* NIST (nist.gov)
* Nmap "Nmap ("Network Mapper") is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts."
* ntop documentation
* ntop homepage @ ntop.org
* ntop overview
* ntop project page @ freshmeat.net
* OpenVPN Project Page
* Osiris project page @ freshmeat.net "a host integrity management system that can be used to monitor changes to a network of hosts over time and report those changes back to the administrator(s)"
* pamusb @ pamusb.org pam_usb "is a PAM modules that enables either two-factor or password-less authentication using an USB storage device (such as an USB Flash Memory Token). It can work with any PAM enabled program, such as login, su, gdm/kdm/xdm, xlock..."
* Perl and Python @ techbooksforfree.com
* Rootkit Hunter - Mailing List
* Rootkit Hunter (rkhunter) "This tool scans for rootkits, backdoors and local exploits by running tests"
* Science and Engineering @ techbooksforfree.com
* Securing Debian Manual @ Debian.org
* Security-enhanced Linux (nsa.gov) SELinux
* Security @ techbooksforfree.com
* Security Tools, Unix Host and Network
* SELinux for Distributions
* SELinux Policy Editor Project
* SELinux Policy Tools GUI tools
* Shmoo Group, The
* Sleuth Kit & Autopsy, The : Forensics Tools for Linux and other Unixes
* Snort "Intrusion Detection" "It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis"
* Swatch "Swatch started out as the "simple watchdog" for activly monitoring log files produced by UNIX's syslog facility. It has since been evolving into a utility that can monitor just about any type of log"
* Sygate's Security Scans Online Web Based Security Test - Port Scanner
* System Rescue CD Forums
* System Rescue CD Project Page
* Top 75 Network Security Tools - insecure.org
* Tor Home (tor.eff.org)
* Tor : Onion Routing or-talk mailing list archives "The or-talk mailing list is for all discussion about theory, design, and development of Onion Routing"
* Tor Test Results (see if you're running Tor) @ harvard.edu
* Tripwire (a very simple copy and paste setup for) step by step it's probably the easiest way to setup Tripwire on your Linux box.
* Tripwire homepage
* Trojan Scan (Derks.IT: Tools) " Trojan scan is a simple shell script that allows for simple but relatively effective checking for trojans, rootkits and other malware that may be using your server and network for unwanted (and possibly illegal) purposes"
* Zenoss Core - Enterprise IT Monitoring project page @ sourceforge.net
* Zenoss - Open Source Network & Systems Monitoring "Zenoss Core is an enterprise-grade network and systems monitoring product that delivers the functionality IT operations teams need to effectively manage the health and performance of their entire infrastructure through a single, integrated package."
Page generated on Mon May 7 07:37:16 2007