nano doesn't use Ctrl-S - Save because Ctrl-s halts output in most terminal programs. The display would freeze. Ctrl-S is "XOFF", while Ctrl-Q is "XON". To unfreeze the display after an XOFF, type Ctrl-Q.
Thanks a lot, very clearly and strongly you delivered this subject......please put up more videos regarding LINUX systems, Firewall associated with open sources, OSSIM and IDS. Appreciate your dedication.
Last time I messed with iptables was back in 2003, I configured a Redhat Linux box with 2 NIC's as a DHCP/DNS/NAT/Firewall server. I've slept since then but I can see not much has changed. VERY helpful video. I love the presentation, keep it up!
So at 7:24, the attacker must be on the same intranet/LAN to do this attack, right? If not, how can he spoof victim's IP address and act on the network like that?
You could charge folk for whats in your head, remarkably well explained, not once did i even consider distro's. i tire at explanation videos being laid out in ubuntu.
Anyone knows why "--dport" does not show in "man iptables", or "iptables --help" either? Once using a DROP policy, any rules I tried (the one from that video included), I can't ssh anymore. using iptables 1.6.0 in virtualbox 5.0.24, ubuntu 16.04
nano doesn't use Ctrl-S - Save because Ctrl-s halts output in most terminal programs. The display would freeze. Ctrl-S is "XOFF", while Ctrl-Q is "XON". To unfreeze the display after an XOFF, type Ctrl-Q.
8 Years later and still relevant. Thank you for taking the time to put this together.
This was put together in a really easy to understand format. Thank you!
Very useful still after so many years. Thanks.
Very well explained - Not only good for the content, just the right level for a start, but also for the quality of the delivery. Thumbs up!
Thank you so much for taking the time to put this video up. You have a great teaching style. This helped me a lot!
Great freaking video dude! Can't thank you enough.
Thanks a lot, very clearly and strongly you delivered this subject......please put up more videos regarding LINUX systems, Firewall associated with open sources, OSSIM and IDS.
Appreciate your dedication.
Thank you !!. excellent illustration for describing every command line in detail. please post more of what you know.
We all appreciate your time !!
Simple and easy to follow. Thank you for putting this up!
Thank you, very very helpful. 42:54 minutes well invested.
Outstanding video, very informative. Thank you so much!
you did a great job - businesslike - concise - to the point!
Last time I messed with iptables was back in 2003, I configured a Redhat Linux box with 2 NIC's as a DHCP/DNS/NAT/Firewall server. I've slept since then but I can see not much has changed. VERY helpful video. I love the presentation, keep it up!
Excellent! One of the best tutorial videos I've ever seen. Very well explained. I learned a lot from it. Thanks!
I agree with everyone. Easy to follow and understand.
Fantastic - you have nailed it - a medium/advanced topic in laymans terms. It's not an easy feat. Thank you!
So at 7:24, the attacker must be on the same intranet/LAN to do this attack, right? If not, how can he spoof victim's IP address and act on the network like that?
nice, logical presentation. very helpful
very good introduction thank you very much !!!
Great Video, Clear and Simple
You could charge folk for whats in your head, remarkably well explained, not once did i even consider distro's. i tire at explanation videos being laid out in ubuntu.
Very well put together, and informative..However my only problem is figuring out if my ISP, or my home router will be defined as my server address
Great Video, Clear and Simple Thank you
cheers pal, this will be of much help !!
Thank you very much ! This was very pregnant, precise and well understandable even for German native speakers.
pregnant? huh?
Thank you soo much for this beautifully explained tutorials pal!!
good tutorial!I noticed that your are a expert at network security.May I ask you some questions?谢谢
can i ask you one question Sir? I am stuck in between of my task and couldnt find answer of it.
this is really useful video, thank you very much
Thank you for your videos.
At 17:10 (icmp packet rules), second rule should have interface option as -o and not -i . Please correct me if i am wrong.
thank you . excellent Lecture!
Pretty awesome lecture...
Helped me a lot...
tried to use iptables to block facebook...but that is just to strong. even used that 443 port but still didn't succeed any suggestions ?
so far the best tutorial
delivered the concepts simply....... great !!!!!!!!!!!!!!!!!!!!!!!! :)
Why are the subnets "/8", "/12", and "/16" instead of "/8", "/16", and "/24"
whats the path for the firewallrules executable ?
great video! much appreciated!
Anyone knows why "--dport" does not show in "man iptables", or "iptables --help" either?
Once using a DROP policy, any rules I tried (the one from that video included), I can't ssh anymore. using iptables 1.6.0 in virtualbox 5.0.24, ubuntu 16.04
Sadly that FORWARD theme wasn't covered...
what if I want to block IP but I like to let only 1 of 12 users to have access to this IP
Briliiant thanks for sharing.
Thanks for good video. actually, deny policies ain't only more secured, it's more compact/fast/(lite for cpu + ram) as well.
cracking video man ty :)
good for RHCE and LFCE prep
THANK YOU!
Just Amazing!
Thank you!!!!
"iptables v1.4.21: Can't use -i with OUTPUT", had to instead -o wlpl2s0
very good
Shabang! :)) Thank you
That subliminal diss on microsoft powerpoint😂😂
Good!
thanks
Ameen 🎉.
🙏🙏👈🔔💯
I was looking for openSuSEfirewall and i ended up here...
who's watching in 2020+Corona :D ??
Computer and Network Security, ¿there's a way to debug the script and show where may have or identify an error if that would be the case?