"IP addresses" tag

IPCop 2.0.6: The New Watchdog!

This article describes the various functionalities of a network-based firewall, besides taking readers through the installation and configuration of IPCop 2.0.6, especially from the perspective of a small and medium business. It also…

Nginx also likes to throw a 403 error and close the connetction

Methods To Lock Down WordPress wp-admin, and Accessing it Using SOCKS5 Proxy

It’s as simple as this: have SSH listen on the standard port 22, and when you check your server logs, you see all sorts of random people trying to login to your server….

Blocking outgoing traffic

Guard Your Network with IPCop, Part 3: Block Outgoing Traffic

The first article in the series discussed IPCop 1.4.21, its basic installation and configuration. Though an excellent firewall distro, basic IPCop has limited functionality. To enhance it, various add-ons are available. We covered…

IPsec VPN Penetration Testing

IPsec VPN Penetration Testing with BackTrack Tools

This article outlines the value of penetration-testing VPN gateways for known vulnerabilities and also shows you how to prevent a breach into the internal network. IPsec is the most commonly used technology for…

Cyber Attack

Cyber Attacks Explained: Network Sniffing

In earlier articles in this series, we have explored denial of service attacks and packet spoofing. This month, let us focus on a wider hacking approach called network sniffing, which is very commonly…

Rootkits: The Enemy Within

Rootkits: The Enemy Within

While it was assumed in the past that viruses only targeted Windows, hackers targeting the FOSS world proved this wrong. A rootkit on a Linux distribution makes it vulnerable to programmatic and manual…

Warning signs!

The Next Y2K — Are We Ready for a Web Without IPv4 Yet?

Yes, we’ve have done it again — brought the world to the brink of another disaster, because we’ve failed to foresee the exponential growth of the Internet! Read on to learn about why…

A Recap

Advanced Nmap: A Recap

This final article in the series consolidates information from the previous articles, looks at NMap’s future possibilities, and at the new tools from the development team. Beginning its life as a simple port-scanner,…

DeliGate, a Proxy

DeleGate — A Multi-platform, Multipurpose Proxy Server

A proxy server works as an intermediary for requests from clients seeking resources from other servers. There are various types of proxy servers. In this article, we will briefly discuss one of them,…

Firewall Scan

Advanced Nmap: Scanning Firewalls

After four articles on Nmap [1, 2, 3 & 4], which explained a number of command-line options for scan technique specification, target specification, port specifications, host discovery, evasion techniques, etc, it is time…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.