HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Overview of the main applications of Linux for security
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Overview of the main applications of Linux for security  
> Access to the content HTML Beginning of the presentation  
> Description How to use Linux for information systems security.  
> Context & Dates Talk made at Linux-Expo, during the "Linux and security" tutorial:
  • French version: in Paris on 1st February 2000 and Montreal on 10 April 2000
  • English version: in Madrid on 26 April 2000 and in Sao Paulo on 26 September 2000
     
  • > Author Stéphane Aubert and Hervé Schauer (Herve.Schauer@hsc.fr) 
    > Type 15 slides [ French/English - HTML ]  
    > Abstract &
    Table of content
    Flyleaf
    Agenda
    For Secured Internet Gateways - IP filtering
    For Secured Internet Gateways - Web access
    For Secured Internet Gateways - Web server
    For Secured Internet Gateways - DNS server
    For Secured Internet Gateways - Mail server
    For Email security
    For Secured Internet Gateways - Intrusion Detection and Supervision
    For Security Consultants
    For corporate security department
    For network and system administrators
    For Office Networks
    For Secured Workstations
    Conclusion  
    > Related documents
    themeLinux
    [Presentation]  Linux security characteristics [26 September 2000 - French/English]
    [Course]  Linux Security
    [Presentation]  Linux and security [22 November 2002 - French]
    [Presentation]  Some of Linux specificities for security [1 February 2002 - French]
    [Presentation]  Linux Kernel Hardening - The useful and the futile in the grsecurity patch [28 January 2002 - French]
    [Presentation]  Strengthening the Linux Kernel [6 February 2001 - French]
    [Article]  Open-source software and security, the example of Linux [November 2000 - French]
    [Tip]  Linux Kernel Modules (LKM): what benefits for administrators? [25 October 2000 - French/English]
    [Presentation]  Linux and Security [13 April 2000 - French]
    [Course]  Linux Security [9 December 1999 - French]
    [Presentation]  Encrypted tunnels with Linux [18 June 1999 - French]
    [Presentation]  Specific security characteristics of Linux [18 June 1999 - French]
    [Presentation]  Linux for computer security [18 June 1999 - French]
    [Presentation]  Linux for Computer Security [24 March 1999 - French]
    > Copyright © 2000, Hervé Schauer Consultants, all rights reserved.

     

    Last modified on 17 April 2002 at 17:31:46 CET - webmaster@hsc.fr
    Information on this server - © 1989-2010 Hervé Schauer Consultants