finds you similar websites
auto-suggest    top sites

Apr 22nd, 2024

12 Popular Sites Like http://www.fail2ban.org/w...

The team has studied the web and discovered several of the best security and linux sites like this one. So come and discover other webpages that resemble this one.

Displaying 21 to 30 of 500 alternatives to http://www.fail2ban.org/wiki/index..... (Updated: Apr 22nd, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like :
  Main Page - Fail2ban
Features (List of current and planned features) Screenshots ... Retrieved from "http://www.fail2ban.org/wiki/index.php/Main_Page" Views. Page. Discussion ...
http://www.fail2ban.org/wiki/index.php/Main_Page
popularity:
security
linux
firewall
sysadmin
ssh
iptables
software
apache
tools
server
new search by a custom tag signature
  Quick HOWTO : Ch14 : Linux Firewalls Using iptables - Linux Home Networking
The data center section outlines the rationale for either hosting your website ... It also covers how to migrate your existing servers from one data center to ...
similarity:
popularity:
iptables
linux
firewall
security
howto
sysadmin
networking
reference
network
tutorial
  Rootkit Hunter
http://www.rootkit.nl/files/rootkit_documentation.html|Documentation ... Copyright Rootkit.nl / Michael Boelen, 2003-2009. All rights reserved. Hosted by Shock Media ...
similarity:
popularity:
security
linux
rootkit
tools
sysadmin
software
server
unix
opensource
hacking
  Using iptables to Block Brute Force Attacks | MDLog:/sysadmin
No information avaiable
similarity:
popularity:
iptables
linux
security
firewall
ssh
howto
sysadmin
attack
unix
force
  Home
IPFire is maintained by experienced developers, who are really concerned about ... IPFire ships with a custom built paket-manager called Pakfire, so the ...
similarity:
popularity:
firewall
linux
security
opensource
server
network
sysadmin
iptables
livecd
router
  chkrootkit -- locally checks for signs of a rootkit
chkrootkit locally checks for signs of a rootkit. Includes ifpromisc.c to check if the interface is in promiscuous mode, chklastlog.c and chkwtmp.c to check for ...
similarity:
popularity:
security
linux
rootkit
tools
software
sysadmin
unix
opensource
tool
hacking
  grsecurity
grsecurity is an innovative approach to security utilizing a multi-layered ... It is licensed under the GPL. It offers among many other features: ...
similarity:
popularity:
security
linux
kernel
software
sysadmin
grsecurity
opensource
rbac
server
unix
  TECH SOURCE FROM BOHOL: 10 Best Hacking and Security Software Tools for Linux
Hacks, News, Tutorials, Reviews about Linux, Open Source, Ubuntu, Google, Apple, Microsoft, Programming, Gadgets, and everything related to Digital Technology.
similarity:
popularity:
linux
security
tools
hacking
software
unix
sysadmin
hack
utilities
ubuntu
  An iptables guide & tutorial - iptablesrocks.org
Iptablesrocks.org covers the installation of iptables in a Redhat environment, the ... Find out what other people have had to say about iptablesrocks.org ...
similarity:
popularity:
linux
iptables
firewall
security
tutorial
networking
howto
sysadmin
network
reference
  Iptables Limits Connections Per IP
Explains howto use iptables to rate-limit incoming connections for port 80, 443, 25 to limit number of connections per IP.
similarity:
popularity:
iptables
linux
security
firewall
sysadmin
server
limit
connection
ip
apache
  Home
The best open source projects, integrated and made easier for spam blocking, web filtering, remote access and more ... Untangle's Firewall filters traffic ...
similarity:
popularity:
security
firewall
opensource
linux
network
networking
software
free
sysadmin
vpn
< prev ... 1 2 3 4 5 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.