Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
Okay, here's the deal:
A few nights ago, I noticed that someone had connected to my wireless network and was downloading something. Well, I left the access point open and was asking for trouble (mostly because I was having some difficult getting the wireless to work and never really closed it once it was). So, in my lock down attempts, I thought about what we need to do to access the wireless at school and work. Here's that rundown:
1) upon connecting, we are redirected to a webpage
2) we need to supply login credentials
3) we are handed a valid IP and have unlimited access to the internet.
After studying a little on the vulnerabilities of Wireless Networks, I have concluded that this is, probably, the safest way to go (after implementing all the others, that is). I would like to do this with Linux, but am unsure of where to go to get it done.
My AP is a LinkSys and will point (theoretically) to a RADIUS server. I configured, somewhat, freeRADIUS on Fedora Core 4 to act as that RADIUS server, but I'm unsure as to whether it is, indeed, the way to go.
Any thoughts? Mind you I would prefer to use all Open Source for this experiment.
Yeah, I have WEP and MAC filtering. The big thing is that those alone are enough to discourage a lot of people from attempting. But what about those that it doesn't discourage? What about a business who insists on Wireless, implements all of those, but still is hacked? I would like to add the authentication to it to discourage all but the really gun-ho of them.