background preloader

PfSense Open Source Firewall Distribution - Home

https://www.pfsense.org/

Network Monitoring Tools Les Cottrell, SLAC. Last Update: December 14, 2015 ESnet | ESCC | PinGER Internet monitoring | Tutorial This is a list of tools used for Network (both LAN and WAN) Monitoring tools and where to find out more about them. The audience is mainly network administrators. You are welcome to provide links to this web page. Please do not make a copy of this web page and place it at your web site since it will quickly be out of date. See here if you wish to suggest additions or changes. Download Knoppix Live CD or DVD, Get Documentation and Help What is KNOPPIX? KNOPPIX is a bootable CD with a collection of GNU/Linux software, automatic hardware detection, and support for many graphics cards, sound cards, SCSI and USB devices and other peripherals. KNOPPIX can be used as a Linux demo, educational CD, rescue system, or adapted and used as a platform for commercial software product demos.

TrueCrypt Tutorial: Truly Portable Data Encryption In the previous article I described the program Cryptsetup, which enables you to efficiently encrypt your data. Somebody would ask: “So what is the reason for wasting time describing the same thing using different software?”. My answer is: “Because I want to give users the choice so that everyone can decide which program they want to use.” wall m0n0wall is a project aimed at creating a complete, embedded firewall software package that, when used together with an embedded PC, provides all the important features of commercial firewall boxes (including ease of use) at a fraction of the price (free software). m0n0wall is based on a bare-bones version of FreeBSD, along with a web server, PHP and a few other utilities. The entire system configuration is stored in one single XML text file to keep things transparent. m0n0wall is probably the first UNIX system that has its boot-time configuration done with PHP, rather than the usual shell scripts, and that has the entire system configuration stored in XML format. In m0n0wall 1.8.1, the base system has been switched to FreeBSD 8.4 for better support of recent hardware, and there have been significant improvements, new features and bug fixes in many areas.

Enumerating Metadata Introduction Abraham Lincoln always said that if he only had six hours to cut down a tree, he would spend this first four sharpening his axe. Those in the security community often relate this statement to the information gathering and reconnaissance phases of breaking into another system. In the reconnaissance phase a potential intruder will spend a great deal of time learning everything they can about their target before they attempt any sort of exploitation because the information gathered here is often crucial in order to find weaknesses in a system or its user. In this article I’m going to discuss the importance of metadata as it relates to reconnaissance.

Access Control and Access Control Operators - Squid User's Guide Access control lists (acls) are often the most difficult part of the configuration of a Squid cache: the layout and concept is not immediately obvious to most people. Hang on to your hat! Unless the Squid Configuration Basics chapter is still fresh in your mind, you may wish to skip back and review the access control section of that chapter before you continue. This chapter assumes that you understood the difference between an acl and an acl-operator. The primary use of the acl system is to implement simple access control: to stop other people using your cache infrastructure. SquidFaq/ReverseProxy What is the Reverse Proxy (httpd-accelerator) mode? Occasionally people have trouble understanding accelerators and proxy caches, usually resulting from mixed up interpretations of "incoming" and "outgoing" data. I think in terms of requests (i.e., an outgoing request is from the local site out to the big bad Internet). The data received in reply is incoming, of course. Others think in the opposite sense of "a request for incoming data".

Related: