nano doesn't use Ctrl-S - Save because Ctrl-s halts output in most terminal programs. The display would freeze. Ctrl-S is "XOFF", while Ctrl-Q is "XON". To unfreeze the display after an XOFF, type Ctrl-Q.
Thanks a lot, very clearly and strongly you delivered this subject......please put up more videos regarding LINUX systems, Firewall associated with open sources, OSSIM and IDS. Appreciate your dedication.
Last time I messed with iptables was back in 2003, I configured a Redhat Linux box with 2 NIC's as a DHCP/DNS/NAT/Firewall server. I've slept since then but I can see not much has changed. VERY helpful video. I love the presentation, keep it up!
So at 7:24, the attacker must be on the same intranet/LAN to do this attack, right? If not, how can he spoof victim's IP address and act on the network like that?
You could charge folk for whats in your head, remarkably well explained, not once did i even consider distro's. i tire at explanation videos being laid out in ubuntu.
Anyone knows why "--dport" does not show in "man iptables", or "iptables --help" either? Once using a DROP policy, any rules I tried (the one from that video included), I can't ssh anymore. using iptables 1.6.0 in virtualbox 5.0.24, ubuntu 16.04
8 Years later and still relevant. Thank you for taking the time to put this together.
This was put together in a really easy to understand format. Thank you!
Very useful still after so many years. Thanks.
nano doesn't use Ctrl-S - Save because Ctrl-s halts output in most terminal programs. The display would freeze. Ctrl-S is "XOFF", while Ctrl-Q is "XON". To unfreeze the display after an XOFF, type Ctrl-Q.
Very well explained - Not only good for the content, just the right level for a start, but also for the quality of the delivery. Thumbs up!
Great freaking video dude! Can't thank you enough.
Thank you so much for taking the time to put this video up. You have a great teaching style. This helped me a lot!
Fantastic - you have nailed it - a medium/advanced topic in laymans terms. It's not an easy feat. Thank you!
Thank you !!. excellent illustration for describing every command line in detail. please post more of what you know.
We all appreciate your time !!
Great explanation, thanks man!
Thanks a lot, very clearly and strongly you delivered this subject......please put up more videos regarding LINUX systems, Firewall associated with open sources, OSSIM and IDS.
Appreciate your dedication.
Outstanding video, very informative. Thank you so much!
Simple and easy to follow. Thank you for putting this up!
Excellent! One of the best tutorial videos I've ever seen. Very well explained. I learned a lot from it. Thanks!
you did a great job - businesslike - concise - to the point!
Last time I messed with iptables was back in 2003, I configured a Redhat Linux box with 2 NIC's as a DHCP/DNS/NAT/Firewall server. I've slept since then but I can see not much has changed. VERY helpful video. I love the presentation, keep it up!
Thank you, very very helpful. 42:54 minutes well invested.
Thank you very much ! This was very pregnant, precise and well understandable even for German native speakers.
pregnant? huh?
Great Video, Clear and Simple
I agree with everyone. Easy to follow and understand.
cheers pal, this will be of much help !!
so far the best tutorial
delivered the concepts simply....... great !!!!!!!!!!!!!!!!!!!!!!!! :)
nice, logical presentation. very helpful
very good introduction thank you very much !!!
Thank you soo much for this beautifully explained tutorials pal!!
Great Video, Clear and Simple Thank you
Thank you for your videos.
this is really useful video, thank you very much
great video! much appreciated!
So at 7:24, the attacker must be on the same intranet/LAN to do this attack, right? If not, how can he spoof victim's IP address and act on the network like that?
You could charge folk for whats in your head, remarkably well explained, not once did i even consider distro's. i tire at explanation videos being laid out in ubuntu.
thank you . excellent Lecture!
At 17:10 (icmp packet rules), second rule should have interface option as -o and not -i . Please correct me if i am wrong.
Pretty awesome lecture...
Helped me a lot...
Very well put together, and informative..However my only problem is figuring out if my ISP, or my home router will be defined as my server address
cracking video man ty :)
Anyone knows why "--dport" does not show in "man iptables", or "iptables --help" either?
Once using a DROP policy, any rules I tried (the one from that video included), I can't ssh anymore. using iptables 1.6.0 in virtualbox 5.0.24, ubuntu 16.04
Briliiant thanks for sharing.
tried to use iptables to block facebook...but that is just to strong. even used that 443 port but still didn't succeed any suggestions ?
THANK YOU!
what if I want to block IP but I like to let only 1 of 12 users to have access to this IP
whats the path for the firewallrules executable ?
can i ask you one question Sir? I am stuck in between of my task and couldnt find answer of it.
Just Amazing!
Thank you!!!!
Why are the subnets "/8", "/12", and "/16" instead of "/8", "/16", and "/24"
good tutorial!I noticed that your are a expert at network security.May I ask you some questions?谢谢
"iptables v1.4.21: Can't use -i with OUTPUT", had to instead -o wlpl2s0
Thanks for good video. actually, deny policies ain't only more secured, it's more compact/fast/(lite for cpu + ram) as well.
very good
Sadly that FORWARD theme wasn't covered...
Good!
good for RHCE and LFCE prep
Ameen 🎉.
Shabang! :)) Thank you
thanks
🙏🙏👈🔔💯
That subliminal diss on microsoft powerpoint😂😂
I was looking for openSuSEfirewall and i ended up here...
who's watching in 2020+Corona :D ??
Computer and Network Security, ¿there's a way to debug the script and show where may have or identify an error if that would be the case?