> Day 1 - Comparing the commands between Microsoft and Linux, > 3 way Handshake, Portnumbers, NetBIOS over TCP/IP > Day 2 - Advanced TCP/IP: Ping Sweep, Portscans, IP Spoofing, > Promiscuous Mode, Fingerprinting > Day 3 - Attacking Microsoft Operating Systems > Day 4 - Attacking Linux Operating Systems > Day 5 - Attacking WLAN
> Day 1 - Sniffing Techniques > Day 2 - Security Analyzer, Firewalling with iptables > Day 3 - Intrusion Detection System > Day 4 - Building a Honeypot > Day 5 - Logfiles Expensive. I'd rather buy books on the topic. And with extra effort you can get detailed and authoritative information from the internet too. ed [!] http://i.keepsilent.net Professor at the University of my Living Room Sofa Senior Researcher of the Kitchen Refrigerator -- Philippine Linux Users' Group (PLUG) Mailing List [EMAIL PROTECTED] (#PLUG @ irc.free.net.ph) Official Website: http://plug.linux.org.ph Searchable Archives: http://marc.free.net.ph . To leave, go to http://lists.q-linux.com/mailman/listinfo/plug . Are you a Linux newbie? To join the newbie list, go to http://lists.q-linux.com/mailman/listinfo/ph-linux-newbie
