Solved

Linux Security

Posted on 2006-06-08
1
216 Views
Last Modified: 2010-04-11
Hello I went to a job interview in which the knowledge on linux security had to be vast. However, I was not disclosed detailed information on the solution in place, however I was told that Linux was used as the front line of defense and had a firewall installed on it which is open source according to the manager. I was wondering if you experts were familiar on those types of open source programs/solutions for linux.

I was also wondering where does that leave CISCO firewalls compared to the linux-only solution. In addition, the interviewer also told me that he taught CISCO in a technical shool for many years and that has left me wondering since he told me that there are Linux Security certifications that cost more than $3,000 US and that very very few people had those certs since they were so hard and costly.

Can somebody please enlighten me on this secret world of Linux Security. Thanks.

0
Comment
Question by:elyrodriguez
1 Comment
 
LVL 9

Accepted Solution

by:
gtkfreak earned 125 total points
ID: 16868243
All details on Linux Security can be found out on the internet. Linux uses a firewall in-built called iptables. You also have other firewalls like firestarter. These are open-source solutions for Linux. Configuration of rules and tuning instructions are available with them. You can also refer to HOWTOs published by the Linux communities on the internet. Many setups use old computers and dedicate them as firewall products. You also have proxy servers such as Squid and other software like spamassassin, netfilter, clamav (antivirus), snort intrusion detection system, network analyzers such as ethereal, vulnerability scanners such as nessus. To get to know more about these, you can install Linux on your computer and experiment on them. You can start with http://www.tldp.org and look for the HOWTO on Linux Security and further references.

AFAIK, the certification courses of RedHat i.e. RHCE are most popular. You can get more details on the Red Hat site on them.

0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Big data transfers via information superhighways require special attention and protection. Learn more about the IT-regulations of the country where your server is located. Analyze cloud providers and their encryption systems for safe data transit. S…
The new Gmail Phishing Scam going around is surprising even the savviest of users with its sophisticated techniques. This attack comes as a nightmare trifecta for email filtering services; sent from a familiar contact, using authentic tone and verbi…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now