lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <361c9c560906030605q3d452467mbd2223ed80766020@mail.gmail.com>
Date: Wed, 3 Jun 2009 15:05:43 +0200
From: Ahmed Sheipani <sheipani@...il.com>
To: dailydave@...ts.immunitysec.com, 
	"bugtraq@...urityfocus.com" <bugtraq@...urityfocus.com>, 
	"vulnwatch@...nwatch.org" <vulnwatch@...nwatch.org>, 
	"full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Hardening TCP/IP Stack

*Hardening TCP/IP Stack*

*By Ahmed S. Shibani*

* *

*Overview*

* *

     During my work as a server administrator for a web hosting company, I
have noticed how often it is to get under random SYN flood attacks, and
using the latest firewalls did not prove to be the ultimate solution, you
still get affected by the attacks, I believe that the best way to mitigate
those attacks is by securing the TCP/IP stack itself, here I will collect
the most useful information I have found on doing this. All instructions in
this article will be for Linux, I will indicate so if different.

Continue Reading...<http://sec.ure.ly/?s=blog&m=permalink&x=hardening-tcpip-stack>

http://sec.ure.ly

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ