Configuration and Evaluation of Some Microsoft and Linux Proxy Servers, Security, Intrusion Detection, AntiVirus and AntiSpam Tools Configuration and Evaluation of Some Microsoft and Linux Proxy Servers, Security, Intrusion Detection, AntiVirus and AntiSpam Tools

Configuration and Evaluation of Some Microsoft and Linux Proxy Servers, Security, Intrusion Detection, AntiVirus and AntiSpam Tools

    • $14.99
    • $14.99

Publisher Description

The book consists from three parts:
• Part A: Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server
• Part B: Evaluation of Some Windows and Linux Intrusion Detection Tools
• Part C: Quick Configuration of Postfix Mail Server to Support Anti Spam and Anti Virus Using Two Methods

I. Part A: Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server.
Part A concerns about basic Microsoft ISA server and Linux Squid Server configuration As a lot of technicians switch between ISA server and Squid server, I decided to write this paper to present some reference when configuring ISA and Squid. There a lot of issues that not covered, and you can go to the manual of ISA server and Squid server for detailed configuration of ISA and Squid. The paper is composed from two parts
Microsoft ISA server 2004 Configuration
Linux Squid Server Configuration

II. Part B: Evaluation of Some Windows and Linux Intrusion Detection Tools
Part B evaluates some the security tools. Top security tools can be found in http://sectools.org/. Most important vulnerabilities in Windows and Linux can be found in www.sans.org/top20/. The paper covers the installation and configuration of the following security tools:
• LANguard
• Nessus
• Snort
• BASE
• ACID
• Rman
• SnortCenter.
• OSSEC
• Sguil

III. Part C: Quick Configuration of Postfix Mail Server to Support Anti Spam and Anti Virus Using Two Methods
In Part C, I configured the Postfix mail server that support the Anti-Spam and Anti-Virus, using two methods, for sake of evaluation and realizing which method can be considered to be the best,
• Method 1: With Postfix, SpamAssassin, ClamAV and Amavis-new
• Method 2: With Postfix, SpamAssassin, ClamAV and Procmail

GENRE
Computers & Internet
RELEASED
2020
December 24
LANGUAGE
EN
English
LENGTH
62
Pages
PUBLISHER
Lulu.com
SELLER
Lulu Enterprises, Inc.
SIZE
419.3
KB
Dr. Tom Shinder's Configuring ISA Server 2004 Dr. Tom Shinder's Configuring ISA Server 2004
2004
Hack Proofing Linux Hack Proofing Linux
2001
Configuring ISA Server 2000 Configuring ISA Server 2000
2001
Dr. Tom Shinder's ISA Server 2006 Migration Guide (Enhanced Edition) Dr. Tom Shinder's ISA Server 2006 Migration Guide (Enhanced Edition)
2011
Checkpoint Next Generation Security Administration Checkpoint Next Generation Security Administration
2002
Dr Tom Shinder's ISA Server and Beyond (Enhanced Edition) Dr Tom Shinder's ISA Server and Beyond (Enhanced Edition)
2002
Earning Money through Crypto Currency Airdrops, Bounties, Faucets, Cloud Mining Websites and Exchanges Earning Money through Crypto Currency Airdrops, Bounties, Faucets, Cloud Mining Websites and Exchanges
2020
مواضيع متفرقه حول الحسد والمس بالجن والسحر‬ مواضيع متفرقه حول الحسد والمس بالجن والسحر‬
2020
Distribution of Electrical Power Distribution of Electrical Power
2020
تاريخ الأديان والحضارات تاريخ الأديان والحضارات
2021
Hacking of Computer Networks Hacking of Computer Networks
2020
Quick Guide for Creating, Selling and Buying Non-Fungible Tokens (NFTs) Quick Guide for Creating, Selling and Buying Non-Fungible Tokens (NFTs)
2022