[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: First Steps.

I can recommend you this book: "Linux Firewalls Attack Detection and Response with Iptables, PSAD, and Fwsnort"
It goes very deep into the theoretical  and practical  use of firewalls on Linux.
It also goes into intrusion prevention and detection.

You can also dig into the Debian security manual: http://www.debian.org/doc/manuals/securing-debian-howto/
And you can start auditing your system now with: tiger, lynis, lsat, logwatch, chkrootkit, rkhunter, debsecan and checksecurity
Use the man pages to learn how to use them ;-)

Good luck!

Kind regards,
Kees de Jong

On Mon, 2011-09-05 at 13:31 +1000, Heddle Weaver wrote:
Thanks for this.
I was thinking to much about books and here I am connected to the 'net.

On 5 September 2011 12:19, Scott Ferguson <prettyfly.productions@gmail.com> wrote:
On 05/09/11 11:52, Heddle Weaver wrote:

Taking first steps in the security world.
I know that a 'firewall' is nothing but a configuration file for
iptables, but that's about it.

Blocking is only part of what constitutes a "firewall" ie. the ultimate firewall is an air-gap.

I need recommendations for literature or other sources of reliable
knowledge that start off with answers to questions such as: 'What is a


Any time and trouble appreciated.



"Do you remember this [beep] - you play certain rock albums backwards - and there's satanic messages?
Let me tell you something - if you're sitting around your house playing your albums backwards.... You are Satan!
You needed look any further. And don't go ruining my stereo to prove a point either."
— Bill Hicks

Met vriendelijke groet,
Kees de Jong

De informatie opgenomen in dit bericht kan vertrouwelijk zijn en is uitsluitend bestemd voor de geadresseerde(n).
Indien u dit bericht onterecht ontvangt, wordt u verzocht de inhoud niet te gebruiken en de afzender direct te informeren door het bericht te retourneren.
The information contained in this message may be confidential and is intended to be exclusively for the addressee(s).
Should you receive this message unintentionally, please do not use the contents herein and notify the sender immediately by return e-mail.

Attachment: signature.asc
Description: This is a digitally signed message part

Reply to: