3
Stop brute force attacks with these iptables examplesview story

http://www.go2linux.org – First let's define with the help of Wikipedia what a dictionary attack is: In cryptanalysis and computer security, a dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching likely possibilities. (HowTos)

4
How to install Nginx to run Drupal with boost, on an Arch Linux serverview story

http://www.go2linux.org – With increasingly faster internet access, these days everyone is waiting for pages to load faster and faster. So if your page does not load fast enough, you can lose too many visitors. According to studies, people wait up to 5 seconds for a page to load, if it does'nt they leave the site. (HowTos)

3
What is new in Firewall Builder 4.0view story

http://www.fwbuilder.org – v4.0 comes with support for high availability configurations for firewalls on Linux, BSD and Cisco PIX. It can generate configuration scripts to manage ip addresses of interfaces,vlans, bridges and bonding interfaces. This is a major upgrade that also adds many improvements in the GUI. (Security)

5
iptables U32 does not workview story

https://www.centos.org – When I try something like, I get:iptables -A FORWARD -p udp -m length --length 39 -m u32 --u32 '27&0x8f=7' --u32 '31=0x527c4833' -j DROPiptables: No chain/targ... [by tkalfaoglu] (Distributions)

5
How to list only directories names on Linuxview story

http://www.go2linux.org – This is a small tip, but a useful one also, to list only the directories in Linux use this command. ls -d ./*/ That will have an output like this (HowTos)

6
iptables rules for desktop computersview story

http://linuxo.com – 503 Service Unavailable: "Today I will show you the iptables rules I set on my main personal computer, with detailed comments about why I came to use these rules after several years of Linux desktop usage." (General)

4
IPTables Firewall – Full Tutorialview story

http://lpilinux.com – iptables is a firewall that is a replacement of the IPChains firewall for the Linux 2.4 kernel and later versions. It requires elevated privileges to operate, and it must be executed by user root, otherwise it fails to function. (HowTos)

5
Snort – Full Tutorialview story

http://lpilinux.com – Snort is an open source network intrusion prevention and detection system that operates as a network sniffer. It logs activities of the network that is matched with the predefined signatures. (HowTos)

6
Enforcement of the GNU GPL in Germany and Europeview story

http://linuxbsdos.com – A. Rationale for enforcement of the GPL – At present, the enforcement of the GPL license conditions is driven by single developers and organizations supporting Free Software. Most famous is Mr. Harald Welte, former maintainer of the Netfilter/Iptables project, who is running the enforcement project gpl-violations.org. Some years ago, Mr. Welte became aware of the [...] (General)

6
Error when redirect through iptablesview story

https://www.centos.org – Hi everyone,Finally I found a solution. In the beginning, two services (or more) can't listen to the same port at the same time. I knew that, the problem was that in Windows it&#03... [by centos_novice] (Distributions)