It goes very deep into the theoretical and practical use of firewalls on Linux.
It also goes into intrusion prevention and detection.
You can also dig into the Debian security manual: http://www.debian.org/doc/manuals/securing-debian-howto/
And you can start auditing your system now with: tiger, lynis, lsat, logwatch, chkrootkit, rkhunter, debsecan and checksecurity
Use the man pages to learn how to use them ;-)
Good luck!
--
Kind regards,
Kees de Jong
On Mon, 2011-09-05 at 13:31 +1000, Heddle Weaver wrote:
Cheers!
Thanks for this.
I was thinking to much about books and here I am connected to the 'net.
On 5 September 2011 12:19, Scott Ferguson <prettyfly.productions@gmail.com> wrote:
On 05/09/11 11:52, Heddle Weaver wrote:
Hello,
Taking first steps in the security world.
I know that a 'firewall' is nothing but a configuration file for
iptables, but that's about it.
Blocking is only part of what constitutes a "firewall" ie. the ultimate firewall is an air-gap.
http://en.wikipedia.org/wiki/Firewall_%28computing%29
I need recommendations for literature or other sources of reliable
knowledge that start off with answers to questions such as: 'What is a
port?'
http://en.wikipedia.org/wiki/Computer_port_%28software%29
Any time and trouble appreciated.
Regards,
Weaver.
--
<snipped>
http://wiki.debian.org/Firewalls
http://www.debian.org/doc/manuals/securing-debian-howto/ch-sec-services.en.html
http://wiki.debian.org/DebianFirewall
Cheers
--
"Do you remember this [beep] - you play certain rock albums backwards - and there's satanic messages?
Let me tell you something - if you're sitting around your house playing your albums backwards.... You are Satan!
You needed look any further. And don't go ruining my stereo to prove a point either."
— Bill Hicks
-- Met vriendelijke groet, Kees de Jong De informatie opgenomen in dit bericht kan vertrouwelijk zijn en is uitsluitend bestemd voor de geadresseerde(n). |
No comments:
Post a Comment