COAST Security Archive Logo Category Index: /pub/doc/tech_tips


No Pointing!

This WWW page was generated automatically. Link makers should not point their links to this page. If you must, please make a link to the search entry point.

Paul Traina, access_list_examples
Abstract: A series of Perl scripts that allow one to quickly and easily configure ACL entries for filewall routers.

Christopher William Klaus, How to set up a Secure Anonymous FTP Site
Abstract: The following is a FAQ on setting up a secure FTP Site. FTP sites are known for much abuse by transferring illegal files. They also open many oppurtunities for intruders to gain access via misconfigured setups. And lastly many versions of ftp servers have had security holes. This FAQ is intended to clean up this abuse by allowing administrators to go through this check list of steps to make sure their FTP is correctly configured and that they are running the most current ftp daemon.

Carnegie Mellon University, Anonymous Ftp Configuration Guidelines
Abstract: Anonymous FTP can be a valuable service if correctly configured and administered. The first section of this document provides general guidance in initial configuration of an anonymous FTP area. The second section addresses the issues and challenges involved when a site wants to provide writable directories within their anonymous FTP areas. The third section provides information about previous CERT advisories related to FTP services. This paper are a set of suggested recommendations that have been beneficial to many sites. CERT recognizes that there will be sites that have unique requirements and needs, and that these sites may choose to implement different configurations.

Unknown, Packet Filtering
Abstract: This directory contains a collection of document on the packet filtering techinque.

Ross N. Williams, Painless Guide To CRC Error Detection Algorithms
Abstract: This document explains CRCs (Cyclic Redundancy Codes) and their table-driven implementations in full, precise detail. Much of the literature on CRCs, and in particular on their table-driven implementations, is a little obscure (or at least seems so to me). This document is an attempt to provide a clear and simple no-nonsense explanation of CRCs and to absolutely nail down every detail of the operation of their high-speed implementations. In addition to this, this document presents a parameterized model CRC algorithm called the "Rocksoft Model CRC Algorithm". The model algorithm can be parameterized to behave like most of the CRC implementations around, and so acts as a good reference for describing particular algorithms. A low-speed implementation of the model CRC algorithm is provided in the C programming language. Lastly there is a section giving two forms of high-speed table driven implementations, and providing a program that generates CRC lookup tables.

Christopher William Klaus, Security Patches FAQ for your System: The Patch List
Abstract: As new systems become accessible by networks there is a need for security. Many systems are shipped insecure which puts the responsibility on the customers to find and apply patches. This FAQ will be a guide for the many administrators who want to secure their systems.

CERT Coordination Center, CERT Coordination Center Generic Security Information
Abstract: The information in this document can be used to prevent several types of break-ins. We encourage system administrators to review all sections of this document and modify their systems accordingly to close these potential vulnerabilities.

_____

O Built by Mark Crosbie and Ivan Krsul.

Security Archive Page Security Archive Homepage.

COAST Homepage COAST Project (CERIAS)Page.

Purdue CS Homepage Purdue CS Dept page.


security-archive@cerias.purdue.edu (COAST Security Archive)