enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. iptables - Wikipedia

    en.wikipedia.org/wiki/Iptables

    There are numerous third-party software applications for iptables that try to facilitate setting up rules. Front-ends in textual or graphical fashion allow users to click-generate simple rulesets; scripts usually refer to shell scripts (but other scripting languages are possible too) that call iptables or (the faster) iptables-restore with a set of predefined rules, or rules expanded from a ...

  3. IPFire - Wikipedia

    en.wikipedia.org/wiki/IPFire

    IPFire is a hardened [3] open source Linux distribution that primarily performs as a router and a firewall; a standalone firewall system with a web-based management console for configuration.

  4. Zeroshell - Wikipedia

    en.wikipedia.org/wiki/Zeroshell

    Zeroshell is a small open-source Linux distribution for servers and embedded systems which aims to provide network services. [1] [2] Its administration relies on a web-based graphical interface; no shell is needed to administer and configure it.

  5. Netfilter - Wikipedia

    en.wikipedia.org/wiki/Netfilter

    Netfilter is a framework provided by the Linux kernel that allows various networking-related operations to be implemented in the form of customized handlers.Netfilter offers various functions and operations for packet filtering, network address translation, and port translation, which provide the functionality required for directing packets through a network and prohibiting packets from ...

  6. Comparison of firewalls - Wikipedia

    en.wikipedia.org/wiki/Comparison_of_firewalls

    Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Unsourced material may be challenged and removed. Find sources: "Comparison of firewalls" – news · newspapers · books · scholar · JSTOR ( July 2023 ) ( Learn how and when to remove this message )

  7. TCP Wrappers - Wikipedia

    en.wikipedia.org/wiki/TCP_Wrappers

    This makes it easy to use for anti-worm scripts, such as DenyHosts or Fail2ban, to add and expire client-blocking rules, when excessive connections and/or many failed login attempts are encountered. While originally written to protect TCP and UDP accepting services, examples of usage to filter on certain ICMP packets exist too, such as 'pingd ...

  8. Loadable kernel module - Wikipedia

    en.wikipedia.org/wiki/Loadable_kernel_module

    In computing, a loadable kernel module (LKM) is an object file that contains code to extend the running kernel, or so-called base kernel, of an operating system.LKMs are typically used to add support for new hardware (as device drivers) and/or filesystems, or for adding system calls.

  9. Port knocking - Wikipedia

    en.wikipedia.org/wiki/Port_knocking

    In computer networking, port knocking is a method of externally opening ports on a firewall by generating a connection attempt on a set of prespecified closed ports. Once a correct sequence of connection attempts is received, the firewall rules are dynamically modified to allow the host which sent the connection attempts to connect over specific port(s).