[2024-feb-29] Sad news: Eric Layton aka Nocturnal Slacker aka vtel57 passed away on Feb 26th, shortly after hospitalization. He was one of our Wiki's most prominent admins. He will be missed.

Welcome to the Slackware Documentation Project

Search

You can find the results of your search below.

Fulltext results:

running_an_access_point_from_a_slackware_box
7 Hits, Last modified:
id so for the moment let's do things with WPA-PSK security which is the WiFi entry level security. Another common mistake is to make hidden SSID WiFi networks: in terms of security it's actually less secure because making it harde... y detail beyond advising to read more about it on security oriented communities like [[http://www.securityfo
postfix_dovecot_mysql
3 Hits, Last modified:
for many use cases as it presents some additional security risks and requirements! In particular, you should... ecured host dedicated to the purpose!</note> For security we will configure Dovecot to provide authenticati... a Slackware 14.1 base installation, with updated security patches, particularly for bash, openssl, openssl-
home_nfs_howto
2 Hits, Last modified:
FS does require some additional work, but as good security habits start at home, these steps will also be pr... portmap daemon chroot to /var/empty for increased security # **** Make the status daemon listen on port 3276
openvpn
2 Hits, Last modified:
ns and remote access facilities. It uses a custom security protocol that utilizes SSL/TLS for key exchange. ... ll as the SSLv3/TLSv1 protocol, and contains many security and control features. ===== 2. Scope and Objecti
checkpoint_snx_client
1 Hits, Last modified:
client used for remote connection to a Checkpoint Security Gateway (([[https://sc1.checkpoint.com/documents/
citrix_client
1 Hits, Last modified:
te Premium Server CA", the issuer of the server's security certificate (SSL error 61). </code> then edit thi
nfs-quick_and_dirty_setup
1 Hits, Last modified:
he root permissions to the nobody user. This is a security feature that prevents privileges from being share
ntp
1 Hits, Last modified:
s also useful in a closed environment, say a high-security installation, where you will not use the NTP pool
tunnel_interfaces
1 Hits, Last modified:
ractive ssh connections set up. Meaning [[howtos:security:sshkeys|authorized_keys setup with public/private
 Search ()