Home
Music_Metasearch
Music Top Sites
Music Store

AllMusicListings
Concert Listings
Concert Tickets

AllMusicTalk
Chat Rooms
Message Boards

MusicNews
Pop Music News
Pop Music Reviews
Music Business
MP3 News

Community Blogs
Free Member Blogs

AllMusicPages
Free Web Pages

AllMusicBookmarks
Your Bookmarks

AllMusicFun
Musical Postcards
Relationship Test
Tarot Readings
Numerology

Music Auctions
Auctions
Classifieds

Music Apparel
AllMusicSearch Apparel

Music Store
MP3 Players
Audio Equipment
MP3 Software

Musical Instruments

Music Books
Music Magazines

Music T-Shirts

Alternative Rock
Blues
Broadway & Vocal
Children's
Christian & Gospel
Classic Rock
Classical
Country
Dance & DJ
Folk
Hard Rock & Metal
International
Jazz
Latin Music
Miscellaneous
New Age
Opera & Vocal
Pop
R&B
Rap & Hip-Hop
Rock
Soundtracks

Music Videos
Music DVDs

AllMusicSearch Music Directory
Web Directory
AllMusicSearch.com Music Guide

Documentation (20)

See Also:
Sites:

http://www.all.net/books/ip/Chap2-1.html
» A Short History of Cryptography Open in a new browser window
   A brief historical analysis of the management of cryptography.
   http://www.all.net/books/ip/Chap2-1.html
ftp://ftp.cs.arizona.edu/reports/1994/TR94-34.ps
» A Simple Scheme to Make Passwords Based on One-Way Functions Much Harder to Crack Open in a new browser window
   Discusses the possibility that crackers might generate and distribute a massive list of encrypted passwords.
   ftp://ftp.cs.arizona.edu/reports/1994/TR94-34.ps
http://en.tldp.org/HOWTO/Firewall-Piercing/
» Firewall Piercing mini-HOWTO Open in a new browser window
   Tutorial on using ppp over telnet to do network stuff transparently through an Internet firewall. (François-René Rideau)
   http://en.tldp.org/HOWTO/Firewall-Piercing/
http://en.tldp.org/HOWTO/Firewall-HOWTO.html
» Firewalling and Proxy Server HOWTO Open in a new browser window
   Teaches the basics of firewall systems and give you some detail on setting up both a filtering and proxy firewall on a Linux based PC, by Mark Grennan.
   http://en.tldp.org/HOWTO/Firewall-HOWTO.html
http://www.itworld.com/LWD111010fwinstall1
» Installing a firewall, Part 1 Open in a new browser window
   Get the details of a secure Trustix 1.1 installation
   http://www.itworld.com/LWD111010fwinstall1
http://www.acm.org/crossroads/xrds6-1/linuxsec.html
» Introduction to Linux Networking and Security Open in a new browser window
   Brief introduction to the IP networking services, how to configure them, and how to set up a relatively secure Linux workstation. Published in ACM Crossroads, the ACM student magazine.
   http://www.acm.org/crossroads/xrds6-1/linuxsec.html
http://en.tldp.org/HOWTO/Bridge+Firewall.html
» Linux Bridge+Firewall Mini-HOWTO Open in a new browser window
   A tutorial on how to setup a bridge and a firewall with Linux, by Peter Breuer.
   http://en.tldp.org/HOWTO/Bridge+Firewall.html
http://www.linux-sec.net/
» Linux Firewall Howto Open in a new browser window
   Firewall HOWTO collection, ids, nids, hardening, penetration testing, auditing
   http://www.linux-sec.net/
http://en.tldp.org/HOWTO/IPCHAINS-HOWTO.html
» Linux IPCHAINS-HOWTO Open in a new browser window
   Describes how to obtain, install and configure the enhanced IP firewalling chains software for Linux, and how they might be used, by Paul Russell.
   http://en.tldp.org/HOWTO/IPCHAINS-HOWTO.html
http://www.itworld.com/lw-01-security
» Linux Security Basics Open in a new browser window
   How to achieve the goal of every system admin: boring, predictable computers
   http://www.itworld.com/lw-01-security
http://scrye.com/~kevin/lsh/t1.html
» Linux Security HOWTO Open in a new browser window
   General overview of security issues that face the administrator of Linux systems. It covers general security philosophy and a number of specific examples of how to better secure your Linux system from intruders.
   http://scrye.com/~kevin/lsh/t1.html
http://www.windowsecurity.com/whitepapers/unix_security/
» Network Security Information: UNIX Open in a new browser window
   Network Security Library has links to many UNIX (and, especially, Linux) security articles on host hardening, security admin guides, and special purpose hardening tips.
   http://www.windowsecurity.com/whitepapers/unix_security/
http://www.ciphersbyritter.com/GLOSSARY.HTM
» Ritter's Crypto Glossary and Dictionary of Technical Cryptography Open in a new browser window
   Hyperlinked definitions and discussions of many cryptographic, mathematics, logic, statistics, and electronics terms used in cipher construction and analysis.
   http://www.ciphersbyritter.com/GLOSSARY.HTM
http://people.netfilter.org/~rusty/unreliable-guides/
» Rusty's Remarkably Unreliable Guides Open in a new browser window
   Netfilter project provides HOWTOs for packet filtering, NAT and netfilter code hacking for Linux.
   http://people.netfilter.org/~rusty/unreliable-guides/
http://en.tldp.org/HOWTO/Secure-POP+SSH.html
» Secure POP via SSH mini-HOWTO Open in a new browser window
   Explains how to set up secure POP connections using ssh, by Manish Singh.
   http://en.tldp.org/HOWTO/Secure-POP+SSH.html
http://www.eng.auburn.edu/users/doug/nis.html
» Securing NIS Open in a new browser window
   Provides a checklist on how to secure UNIX/Linux NIS (formerly YP) services in an intranet environment.
   http://www.eng.auburn.edu/users/doug/nis.html
http://www.fiveanddime.net/ss/secureserver.html
» Setting up a secure Linux server Open in a new browser window
   Setting up a secure Linux server using RedHat and the Linux From Scratch system.
   http://www.fiveanddime.net/ss/secureserver.html
http://www.crypt.gen.nz/selinux/faq.html
» UnOfficial SELinux FAQ Open in a new browser window
   A technical FAQ for the NSA SELinux project, which covers installation and implementation issues.
   http://www.crypt.gen.nz/selinux/faq.html
http://yolinux.com/TUTORIALS/LinuxTutorialInternetSecurity.html
» YoLinux: Internet Server Security HowTo and Tutorial Open in a new browser window
   This tutorial covers the installation and use of hacker protection software such as Portsentry, tripwire, ssh. It also covers configuration and administration steps to make a Linux server secure against hackers.
   http://yolinux.com/TUTORIALS/LinuxTutorialInternetSecurity.html

This category needs an editor

Last Updated: 2007-01-02 19:56:58



Help build the largest human-edited directory on the web.
Submit a Site - Open Directory Project - Become an Editor

The content of this directory is based on the Open Directory and has been modified by AllMusicSearch.com editors

Free previews by Thumbshots.org