Security

Revamp Your IT Career as a Cloud Security Expert

Here’s a ringside view of some exciting and challenging careers in the cloud security realm. The advent of the cloud, which was once a niche concept, has empowered organisations to shift their focus…

Use the Built-in Security Features in Your FOSS Distro

When it comes to securing network infrastructure, the trend is to invest in commercial-grade appliances. Sadly, security designers tend to ignore the built-in security features available in FOSS distros. This article explains a…

Cyber Attacks Explained: Wireless Attacks

Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these benefits comes a threat: wireless networks are…

Tips and tricks for using two factor Authentication Technology

Single password protection techniques, while a well-used and ancient method of protecting access to information or location, are no longer something that can guarantee a reliable means of protecting what you want to…

Your First Site-to-Site VPN

Guard Your Network with IPCop, Part 5: Your First Site-to-Site VPN

The first article in this series discussed the basic installation and configuration of IPCop 1.4.21. Subsequent articles covered six important add-ons: Advanced Proxy, URL Filter, Update Accelerator, Calamaris, Block Outgoing Traffic and Zerina….

Nginx also likes to throw a 403 error and close the connetction

Methods To Lock Down WordPress wp-admin, and Accessing it Using SOCKS5 Proxy

It’s as simple as this: have SSH listen on the standard port 22, and when you check your server logs, you see all sorts of random people trying to login to your server….

About time we guarded this network!

Guard Your Network with IPCop, Part 4: Configuring OpenVPN with Zerina Add-on

The first article in this series discussed the basic installation and configuration of IPCop 1.4.21. Subsequent articles discussed five important add-ons used to enhance IPCop’s functionality: Advanced Proxy, URL Filter, Update Accelerator, Calamaris…

Blocking outgoing traffic

Guard Your Network with IPCop, Part 3: Block Outgoing Traffic

The first article in the series discussed IPCop 1.4.21, its basic installation and configuration. Though an excellent firewall distro, basic IPCop has limited functionality. To enhance it, various add-ons are available. We covered…

IPsec VPN Penetration Testing

IPsec VPN Penetration Testing with BackTrack Tools

This article outlines the value of penetration-testing VPN gateways for known vulnerabilities and also shows you how to prevent a breach into the internal network. IPsec is the most commonly used technology for…

Syn Flooding

SYN Flooding using SCAPY and Prevention using iptables

DoS (Denial of Service) attacks against Web services make them unavailable for legitimate users, affecting the website owner’s potential business. These involve intentional consumption of network, CPU and memory resources. In this article,…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.