=> Cisco 7200 Simulator for Linux. If you decided to study for the Cisco certification, this tool may come handy. Howtoforge has detailed tutorial on setting up a Cisco lab on Linux system. Dynagen is a front-end for use with the Dynamips Cisco router emulator. It uses an INI-like configuration file to provision Dynamips emulator networks. It takes care of specifying the right port adapters, generating and matching up those pesky NIO descriptors, specifying bridges, frame-relay, ATM switches, etc. It also provides a management CLI for listing devices, suspending and reloading instances, determining and managing idle-pc values, performing packet captures, etc.
=> You can capture video of all of the amazing things happening on your desktop with one of Linux’s many screencasting applications. These programs are perfect for creating demonstrations for blogs and tutorials, and for illustrating projects with more than just still images.
=> Postfix Daily Quota reportA shell script hack to create daily quota report for a Posfix mail server including file system usage of each e-mail account.
=> The developers of Firefox have unveiled an experimental project, Snowl, designed to gather all your inbound communications, whether they’re in the form of email, RSS, Twitter, or social network updates.
=> IBM has marked its 10 years of participation in Linux and open source with an open source code contribution focused on supercomputing. The software is available immediately from a software repository run by the University of Illinois’s National Center for Supercomputing Applications (NCSA).
=> Regular nixcraft contributed Ramesh has published a simple 6 steps to secure home wireless router / network
=> LinuxLeak is a new daily destination for all your Linux and Open Source news headlines, updated every 15 minutes. Sysadmin because even developers need heroes!!!
In this practical introduction to the basics of securing your home wireless network, you will learn how to secure a network of game consoles, phones, and PCs. Following are totally useless security measurements specified in arstechnica’s guide:
=> MAC filtering
=> Disable DHCP
=> Disable SSID
You need to enable WPA / WPA2 to protect network (don’t use wep). I also recommend disabling Universal Plug and Play (UPnP) support. The UPnP protocol does not implement any authentication, so UPnP device implementations must implement their own authentication mechanisms, or implement the Device Security Service. Unfortunately, many UPnP device implementations lack authentication mechanisms, and by default assume local systems and their users are completely trustworthy. Most notably, Routers and firewalls running the UPnP IGD protocol are vulnerable to attack since the framers of the protocol omitted to add any standard authentication method.
- Always use WPA / WPA2 with TKIP or AES encrypting with a strong paraphrase
- Change paraphrase every month
- Disable UPnP
- Disable wireless router remote (public IP based) management and ssh / telnet port features. Only use your local PC for telnet / ssh or router management.
- Turn on firewall, port scan and DoS protection (which is a default for many routers)
- Turn on email notification when DoS or port scan attack detected
- You may find our WPA / WPA2 Linux configuration guide useful
- Additional tips for Windows user – Use an anti virus, firewall / internet secruity suite. Most important don’t use bloated Norton product. My personal recommendation is NOD32 or kaspersky anti-Virus. Both are extremely light on system resources and detecting viruses. Either is an excellent anti-virus solution. Keep your operating system and virus databases always up to date.
=> Read: The ABCs of securing your wireless network
If you have more security tips, please add them in the comments.