Configuration and Evaluation of Some Microsoft and Linux Proxy Servers, Security, Intrusion Detection, AntiVirus and AntiSpam Tools Configuration and Evaluation of Some Microsoft and Linux Proxy Servers, Security, Intrusion Detection, AntiVirus and AntiSpam Tools

Configuration and Evaluation of Some Microsoft and Linux Proxy Servers, Security, Intrusion Detection, AntiVirus and AntiSpam Tools

    • ¥1,300
    • ¥1,300

Publisher Description

The book consists from three parts:

•Part A: Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server

•Part B: Evaluation of Some Windows and Linux Intrusion Detection Tools

•Part C: Quick Configuration of Postfix Mail Server to Support Anti Spam and Anti Virus Using Two Methods



I. Part A: Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server.

Part A concerns about basic Microsoft ISA server and Linux Squid Server configuration As a lot of technicians switch between ISA server and Squid server, I decided to write this paper to present some reference when configuring ISA and Squid. There a lot of issues that not covered, and you can go to the manual of ISA server and Squid server for detailed configuration of ISA and Squid. The paper is composed from two parts

Microsoft ISA server 2004 Configuration

Linux Squid Server Configuration



II. Part B: Evaluation of Some Windows and Linux Intrusion Detection Tools

Part B evaluates some the security tools. Top security tools can be found in http://sectools.org/. Most important vulnerabilities in Windows and Linux can be found in www.sans.org/top20/. The paper covers the installation and configuration of the following security tools:

•LANguard

•Nessus

•Snort

•BASE

•ACID

•Rman

•SnortCenter.

•OSSEC

•Sguil



III. Part C: Quick Configuration of Postfix Mail Server to Support Anti Spam and Anti Virus Using Two Methods

In Part C, I configured the Postfix mail server that support the Anti-Spam and Anti-Virus, using two methods, for sake of evaluation and realizing which method can be considered to be the best,

•Method 1: With Postfix, SpamAssassin, ClamAV and Amavis-new

•Method 2: With Postfix, SpamAssassin, ClamAV and Procmail

GENRE
Computers & Internet
RELEASED
2021
April 1
LANGUAGE
EN
English
LENGTH
61
Pages
PUBLISHER
Dr. Hidaia Mahmood Alassouli
SELLER
hidaia alassouli
SIZE
419.3
KB
CCNSP-NP CCNSP-NP
2013
Breaking Computer Network with Internet Breaking Computer Network with Internet
2018
IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking
2017
IBM z/OS V1R13 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking IBM z/OS V1R13 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking
2012
Ubuntu 22.04 LTS Server Ubuntu 22.04 LTS Server
2025
The LPIC-2 Exam Prep The LPIC-2 Exam Prep
2014
Introductory Guideline for Using Twilio Programmable Messaging and Programmable Voice Services Introductory Guideline for Using Twilio Programmable Messaging and Programmable Voice Services
2021
Creating Wordpress Online Store and Wordpress Online Magazine Creating Wordpress Online Store and Wordpress Online Magazine
2020
Evaluation of Some Cloud Based Virtual Private Server (VPS) Providers Evaluation of Some Cloud Based Virtual Private Server (VPS) Providers
2025
Quick Guide for Sizing Off-Grid Solar Power System Quick Guide for Sizing Off-Grid Solar Power System
2024
Quick Guide for Sizing Off-Grid Solar Power System Quick Guide for Sizing Off-Grid Solar Power System
2024
Evaluation of Some SMTP Testing, Email Verification, Header Analysis, SSL Checkers, Email Delivery, Email Forwarding and WordPress Email Tools Evaluation of Some SMTP Testing, Email Verification, Header Analysis, SSL Checkers, Email Delivery, Email Forwarding and WordPress Email Tools
2023