Paul Traina,
access_list_examples
Abstract: A series of Perl scripts that allow one to
quickly and easily configure ACL entries for filewall
routers.
Christopher
William Klaus,
How to set up a Secure Anonymous FTP Site
Abstract: The following is a FAQ on setting up a secure
FTP Site. FTP sites are known for much abuse by transferring
illegal files. They also open many oppurtunities for intruders to
gain access via misconfigured setups. And lastly many versions of
ftp servers have had security holes. This FAQ is intended to
clean up this abuse by allowing administrators to go through this
check list of steps to make sure their FTP is correctly
configured and that they are running the most current ftp
daemon.
Carnegie Mellon
University,
Anonymous Ftp Configuration Guidelines
Abstract: Anonymous FTP can be a valuable service if
correctly configured and administered. The first section of this
document provides general guidance in initial configuration of an
anonymous FTP area. The second section addresses the issues and
challenges involved when a site wants to provide writable
directories within their anonymous FTP areas. The third section
provides information about previous CERT advisories related to
FTP services. This paper are a set of suggested recommendations
that have been beneficial to many sites. CERT recognizes that
there will be sites that have unique requirements and needs, and
that these sites may choose to implement different
configurations.
Unknown,
Packet Filtering
Abstract: This directory contains a collection of document
on the packet filtering techinque.
Ross N. Williams,
Painless Guide To CRC Error Detection Algorithms
Abstract: This document explains CRCs (Cyclic Redundancy
Codes) and their table-driven implementations in full, precise
detail. Much of the literature on CRCs, and in particular on
their table-driven implementations, is a little obscure (or at
least seems so to me). This document is an attempt to provide a
clear and simple no-nonsense explanation of CRCs and to
absolutely nail down every detail of the operation of their
high-speed implementations. In addition to this, this document
presents a parameterized model CRC algorithm called the "Rocksoft
Model CRC Algorithm". The model algorithm can be parameterized to
behave like most of the CRC implementations around, and so acts
as a good reference for describing particular algorithms. A
low-speed implementation of the model CRC algorithm is provided
in the C programming language. Lastly there is a section giving
two forms of high-speed table driven implementations, and
providing a program that generates CRC lookup tables.
Christopher
William Klaus, Security
Patches FAQ for your System: The Patch List
Abstract: As new systems become accessible by networks
there is a need for security. Many systems are shipped insecure
which puts the responsibility on the customers to find and apply
patches. This FAQ will be a guide for the many administrators who
want to secure their systems.
CERT Coordination
Center, CERT
Coordination Center Generic Security Information
Abstract: The information in this document can be used to
prevent several types of break-ins. We encourage system
administrators to review all sections of this document and modify
their systems accordingly to close these potential
vulnerabilities.
Built by Mark Crosbie and Ivan Krsul.