Difference between revisions of "Template:Menu content security"

Line 25: Line 25:
  
 
* [[SSH create key|How-to generate SSH key]]
 
* [[SSH create key|How-to generate SSH key]]
 +
 +
* [[SSH tunneling]]
  
  

Revision as of 15:11, 1 July 2015


Security

How to secure your server / workstation ?


Global security

Internet security Internet security



SSH

SSH SSH




Firewall

FW principle This section explains HOW to create, maintain and use a firewall with IpTables.


Firewall
Basics Firewall principle
Firewall basics
Firewall core (main) protocols
Firewall VPN
Firewall OUTPUT filters
Firewall INPUT filters
Firewall log dropped
Advanced Firewall port forwarding
Firewall source address filtering
Installation and scripts Firewall installation scripts


SSL

SSL SSL certificates and chain of trust


SSL server


VPN

VPN Virtual Private Network (VPN)



Remote desktop

Remote desktop Remote desktop



Intrusion Detection / Protection

Radar Protection is good, but that's not enough! We need to detect attacks.


  • IDS = Intrusion Detection System : tool that detect attacks.
  • IPS = Intrusion Protection System : detect an intrusion attempt and react upon it.


I'm using one of the most famous IDS: "Snort" (https://www.snort.org/).


Crontab

Alarm clock To run some task / scripts periodically


crontab