Join us on a literary world trip!
Add this book to bookshelf
Grey
Write a new comment Default profile 50px
Grey
Subscribe to read the full book or read the first pages for free!
All characters reduced
Configuration and Evaluation of Some Microsoft and Linux Proxy Servers Security Intrusion Detection AntiVirus and AntiSpam Tools - cover

Configuration and Evaluation of Some Microsoft and Linux Proxy Servers Security Intrusion Detection AntiVirus and AntiSpam Tools

Dr. Hidaia Mahmood Alassouli

Publisher: Dr. Hidaia Mahmood Alassouli

  • 0
  • 0
  • 0

Summary

The book consists from three parts:

	Part A: Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server
	Part B: Evaluation of Some Windows and Linux Intrusion Detection Tools
	Part C: Quick Configuration of Postfix Mail Server to Support Anti Spam and Anti Virus Using Two Methods

I. Part A: Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server.
Part A concerns about basic Microsoft ISA server and Linux Squid Server configuration  As a lot of  technicians switch between ISA server and Squid server, I decided to write this paper to present some reference when configuring ISA and Squid. There a lot of issues that not covered, and you can go to the manual of ISA server and Squid server for detailed configuration of ISA and Squid. The paper is composed from two parts
Microsoft ISA server 2004 Configuration
Linux Squid Server Configuration
II. Part B: Evaluation of Some Windows and Linux Intrusion Detection Tools
Part B evaluates some the security tools. Top security tools can be found in http://sectools.org/. Most important vulnerabilities in Windows and Linux can be found in www.sans.org/top20/. The paper covers the installation and configuration of the following security tools:

	LANguard
	Nessus
	Snort
	BASE
	ACID
	Rman
	SnortCenter.
	OSSEC
	Sguil

III. Part C: Quick Configuration of Postfix Mail Server to Support Anti Spam and Anti Virus Using Two Methods
In Part C, I configured the Postfix mail server that support the Anti-Spam and Anti-Virus, using two methods, for sake of evaluation and realizing which method can be considered to be the best,

	Method 1: With Postfix, SpamAssassin, ClamAV and Amavis-new
	Method 2: With Postfix, SpamAssassin, ClamAV and Procmail

 
 

Other books that might interest you

  • Zero Waste Gift Wrap - cover

    Zero Waste Gift Wrap

    Christine Leech

    • 0
    • 1
    • 0
    Inventive ways to wrap presents that are both pretty and planet-friendly! 
     
    Embrace zero waste living with this collection of sustainable gift wrap solutions including furoshiki, the traditional Japanese technique of fabric knotting. What could be nicer than receiving a present AND the beautiful scarf it's wrapped in! 
     
    Whether you use a vintage silk scarf or create your own fabric with patchwork, piecing, and dyeing techniques—or reuse unwanted items to make quirky gift wraps—this collection is packed full of ideas for reducing waste. 
     
    Other ideas include how to make present toppers made from unwanted fabric and yarn scraps—to finish off your gift wrapping with a flourish.
    Show book