warning -- may burn cpu driving temp up.
This article is *old*, but it may still hold useful information
Get real security in a virtual world by getting a professional penetration test or audit done on your network or application.
Help with implementing a certified Information Security Management System with ISO 27001.
a diagram that shows the flow required to do a penetration test, including suggestions for tools *and* contacting the owner of the network in question to be certain permission is given to run the tests. thanks to sunkast for the link.
"exposing fake security since 2003"
an open source vpn solution (win32 and posix compatible)
firewalling, nat, and packet mangling for linux 2.4+
tutorials, scripts, howtos, etc.
notes regarding configuring sasl and postfix on redhat boxen.
network scan via nmap, vulnerability scan via plugins; client-server architecture.
by arunchandar vasan
an article and guide to protecting your server from rootkits.