Contributed by jose on from the gettin-jiggy-with-it dept.
"If you've ever wondered how to set up OpenBSD + RaidFrame to set up a solely RAM based system, here's the How To . It's right next to the How-To for installing OpenBSD inside VMware on your WinXP box and have the OpenBSD instance firewall/NAT for its host.You have to admit, these are some pretty interesting setups.I worked on the first in response to a previous article , and the latter b/c i like VMware. "
(Comments are closed)
By Anonymous Coward () on
this is really cool stuff. thanks for sharing.
By Anonymous Coward () on
By invaderzim () on
By Eric Hacker () hacker.nospam@no.spam.vudu.net on mailto:hacker.nospam@no.spam.vudu.net
On a hub, all traffic will be visible to all other systems on the segment. With a switch, the ARP requests and any other broadcast (like NetBIOS) will still be seen to all others on the segment.
All one has to do to attack the Windows system is to use an address in the Windows assigned segment. This is not suffcient protection in a hostile segment such as for cable modem users directly connecting to the cable modem.
This does protect against attacks from other networks.
Peace
By Anon () on
Just an idea. Could consider setting up and storing the config files in 3 1/2 floppy with the source on CD-R. Can boot up and then still can change config by removing write protect on floppy.
No hard drive needed. Intruder needs physical access to floppy in order to get root on this machine.
Use in a dual-homed application firewall. Fun post.