Skip to content
Defence blues
strongSwan
Red wilds
Privacy greenhouse
Purple crossroads
Indigo observatory
Contact
Initializing search
Defence blues
Going places
Going places
Golem Trust Computing Ltd.
Blue team @SOC
Blue team for dev
Blue team @Home
Bulletproofing servers
Bulletproofing servers
The wake-
up call
Hardening Linux server
Hardening Linux server
User account sanity checks
Remove unnecessary services
Preventing unauthorised access while respecting privacy
The CIA triad framework for security
The CIA triad framework for security
GNU Privacy Guard
Open
VPN
strong
Swan
strong
Swan
Table of contents
Configuration resources
Installing SSH
Harden ssh server
Key management
Jumping hosts
Virtual network computing
Taming permissions, xattrs & the dangers of SUID/SGID
PKI:
The beautiful mess of digital trust
(and why nothing works properly)
From basic monitoring to intrusion detection
Continuous host monitoring and threat detection
Incident response plan
Troubleshooting
Hardening webserver
Smarter mail servers
Honeytech for humans
Stormforge
Table of contents
Configuration resources
strongSwan
¶
Configuration resources
¶
strongSwan
Back to top