References [1] TJustin Peltier,” TheT Need for security Testing”, June 13,2007 [online]. Available:http://www.secureworldexpo.com/articles/?p=46 [Accessed: August.13, 2007]. [2] Wikipedia – The free encyclopedia [online]. Available:http://en.wikipedia.org [Accessed: August 13, 2007] [3] Gianluca Insolvibile, “The Linux Socket Filter: Sniffing Bytes over the Network”,June 1,2001[online]. Available:http://www.linuxjournal.com/article/4659 [Accessed: August 13, 2007]. [4] Rusty Russell, “Packet filtering How TO's- Whats a packet filter”, Jan 24, 2002 [online]. Available:http://www.netfilter.org/documentation/HOWTO//packet-filtering- HOWTO-3.html [Accessed: August 13, 2007]. [5] Rusty Russell, “Linux netfilter Hacking HOW TO's”,July 2PndP 2002[online]. Available:http://www.netfilter.org/documentation/HOWTO//netfilter-hacking- HOWTO.html [Accessed: August 13, 2007]. [6] Victor Castro, “Roll your own firewall with Netfilter”, October 13, 2003[online]. Available:http://www.linuxjournal.com/article/7184 [Accessed: August 13, 2007]. [7]Hardld welte,“Netfilter FAQ“,October 16,2003[online]. Avialable: HThttp://www.netfilter.org/documentation/index.html#documentation-howtoTH [Accessed: August 13, 2007]. [8] James C. Stephens, “Connection tracking”, Jan 27 ,2006[online],Available: HThttp://www.kalamazoolinux.org/presentations/20010417/conntrack.htmlTH [Accessed August 13,2007]. [9] Information, Computer and Network Security Terms Glossary and Dictionary,”Port scan attacks”,[online]. Avialable:http://www.javvin.com/networksecurity/PortScanAttack.html[Accessed August 13, 2007]. [10] Andreas Fink,”Kannel 1.4.1 User guide”,[online]. Avialable: HThttp://www.kannel.org/download/1.4.1/userguide-1.4.1/userguide.html#AEN69TH [Accessed August 13, 2007]. [11] Andreas Fink,”Kannel User Guide”,[online]. Avialable: HThttp://www.kannel.org/download/1.4.1/userguide-1.4.1/userguide.html [AccessedTH August 13, 2007]. [12] Dmytri Kleiner, “Heartbeat Linux HA”,June 2005 [online] . Available: HThttp://www.linux-ha.org/HeartbeatTH [Accessed August 13, 2007]. [13] GreenBow Distributed Firewall, 2003[online]. Available:http://www.thegreenbow.com/fwp.html [Accessed August 14, 2007]. [14] Brian Friesen,”CRC32: Generating a checksum for a file”,December 18,2001[online]. Avialable:http://www.codeproject.com/cpp/crc32.asp [Accessed August 14, 2007]. [15]SSLdocumnetation,August19,2006[online].Avialable:http://www.openssl.org/docs/ss l/ssl.html [Accessed August 16, 2007]. [16]Pavir chandra,Matt Messir,John Viega, , ”Network Security with Openssl”, O'Reilly & Associates, Inc.2002, pp,1-2 [17] Thomas olausson, “Apache failover with heartbeat and mon”, February 05, 2003 [online]. Available: HThttp://www.geocities.com/latompa/ha/apache_heartbeat.htmlTH [Accessed August 16, 2007]. [18] “Monitors”,June 27,2007 [online] . Available: HThttp://mon.wiki.kernel.org/index.php/MonitorsTH [Accessed August 16th, 2007]. [19] “Ultra monkey:Linux-HA and Heartbeat”,Linux-HA & Heartbeat , March,4,2006[online]. Available: http://www.ultramonkey.org/3/linux-ha.html [Accessed: August 16 Pth P, 2007]. [20]“Configuring MySQL Server Replication”,Configuring mysql server replication,2007 [online]. Available:HThttp://docs.hp.com/en/5991-7432/ar01s05.html TH [Accessed August 16th,2007] [21] McCarty Bill, Red Hat Linux Firewall (Linux Solutions from Red Hat experts),”The iptables Facility”,Wiley publishing Inc,2003,pp 229-237 . [22] Sotiris loannidis, Angelos D. Karomytis, Steve M. Bellon, Smith Jonathan, “Implementing a Distributed Firewall”, University of Pennsylvania, AT & T Labs,2000. [23] Angelos Keromytis,”Internet Attacks and Defenses”, University of Columbia,2005 [24] Bellovin Steven M, “Distributed Firewalls”, AT & T research labs,1999. [25] Grant James,Attfield Philip, Armstrong Ken,”Distributed Firewall Technology”,2004. [26] Rubin Rachel, “Smokey: A user-based Distributed Firewall System”, University of California Berkeley, 2003.