Building A Linux Router

Building a reliable, full-featured broadband router can be very easy and cost-efficient. This article is about building one for routing a LAN to the Internet with NAT (Network Address Translation — Linux users also call it as IP Masquerading) using an old computer and a Linux micro-distribution designed to have very low hardware requirements. We’ll end up having a very simple and stable system, yet featuring e.g. iptables based stateful firewalling and remote administration.

Creating PGP-Encrypted E-Mails Using ASP

The Concept of PGP

For PGP-based communication both the sender and receiver should have public and private key pairs. The sender’s public key should be distributed to the receiver. Similarly, the receiver’s public key should be distributed to the sender. When sending a message or a file, the sender can sign using his private key. Also, the sender’s private key is never distributed.

Risk Metrics Needed for IT Security

Business leaders worldwide are becoming more aware of the importance of assuring the security of information assets. Information-security issues are among the hottest topics being addressed in trade media for organizational governance, executive, financial, audit, and IT leaders. Conferences covering the latest information-security issues, tools, and problems abound in both the public and private sectors.

Back To Top