Similar Articles |
|
PC Magazine October 5, 2004 Sheryl Canter |
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. |
PC World September 1, 2000 Jeff Sengstack |
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. |
RootPrompt.org September 7, 2000 Sander Plomp |
Amateur Fortress Building in Linux Part 1 Sander Plomp is tired of articles telling you to edit inetd.conf. So he wrote this article that looks at how to turn your system into amateur fortress in some interesting ways. |
Unix Insider November 2000 Sandra Henry-Stocker |
Tapping on the walls Paring down your network services isn't the only way to protect your systems against attacks: port scanning can also be an effective tool. Here's how to stay one step ahead of your enemy... |
PC World April 2001 Cameron Crouch & Sean Captain |
Is Your PC Safe From the Enemy Within? Does your firewall have a hole in it? New updates fix a potentially disastrous flaw... |
PC Magazine February 15, 2006 Matthew D. Sarrel |
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. |
Unix Insider October 2000 Sandra Henry-Stocker |
Square one Security experts recommend turning off all network services you don't need in order to guard against possible attacks. But how do you know which services you don't need -- and which ones you do? A helpful breakdown of services that are safe to disable... |
PC World December 2003 Scott Spanbauer |
Ultimate Network Security: How to Install a Firewall Everything you need to know about selecting and installing a firewall for your PC or network. |
PC World May 2005 Lincoln Spector |
Hide Your Internet Ports From Snooping Hackers Closing open ports... Turning off Windows new program notification... Printing fonts and saving paper... etc. |
PC Magazine October 1, 2004 Neil J. Rubenking |
Personal Firewall--Don't Surf Without It To gauge the effectiveness of two popular firewall packages, we took the gloves off and attacked the firewall process using techniques available to a malicious program. McAfee Personal Firewall Plus 6.0... Norton Personal Firewall 2005... |
RootPrompt.org June 26, 2000 Lance E. Spitzner |
Knowing When Someone Is Knocking Lance E. Spitzner tells us how you can protect yourself by detecting intrusion attempts and then covers what you can do about them. |
RootPrompt.org September 11, 2000 |
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... |
Linux Journal March 2, 2007 Michael Rash |
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. |
PC Magazine August 3, 2005 Ryan Naraine |
TCP Port Attack Imminent? An ominous increase in sniffing activity on TCP Port 445 could signal an impending attack targeting a recently patched Microsoft vulnerability. |
PC World March 11, 2001 |
Top 5 Firewall Utilities Protect your PC from suspicious activity on your network or the Internet... |
Linux Journal May 1, 2002 Pedro Paulo Ferreira Bueno |
Understanding IDS for Linux A discussion of the different types of intrusion detection systems and how to create signatures to identify attacks... |
PC World December 11, 2000 Sean Captain |
Security Crusader Punches Holes in Firewalls Gibson's simple Trojan horse tricks firewalls from McAfee.com, Symantec, Sygate, and more... |
PC Magazine June 22, 2005 Larry Seltzer |
Make Your Network Safer by Attacking It A number of excellent tools can help you find out where you're network is vulnerable. |
Macworld May 23, 2006 Jeffery Battersby |
Norton Personal Firewall 3.0.3 Easy configuration option for the firewall faint of heart |
PC World December 2005 Stuart J. Johnston |
Windows Bug Allows Repeat Invasions Microsoft recently released a Security Advisory for a Firewall quirk... Avoid a fake Google site... A problem with Windows updates... Fix Wi-Fi router problems... |
PC Magazine February 2, 2005 Robert P. Lipschutz |
Lock Down Your Network When it comes to security, small and midsize businesses (SMBs) often find themselves in an uncomfortable position. They share many of the same security fears that threaten multinational enterprises. |
PC World October 2002 Kalpana Narayanamurthi |
Old Ports for New Notes Ultralight unit the size of a cell phone packs four ports for notebook use. |
PC World May 2001 Scott Spanbauer |
Hunt Down Those Hackers and ... Ignore Them? Uncover possible hackers... customize IE's title bar... install Winamp... |
PC World November 2003 Andrew Brandt |
Privacy Watch: Make Sure Your Firewall Is Sturdy Test your firewall to find out if it has any holes -- and then plug them up. |
PC Magazine August 3, 2004 |
Keep Your PC Safe Learn to wield your firewall, antivirus, and antispyware tools expertly; don't give up your PC without a fight. |
PC World January 2001 Alan Stafford |
Warp Speed Web Access: Sharing the Bandwidth Broadband routers give your network a protected connection to the Internet... |
Linux Journal January 30, 2006 |
What Application Do You Want Ported to Linux? Are you waiting -- patiently or not -- for one application finally to be ported to Linux to make your life easier? Novell wants to know what it is. |
PC World June 2004 Mary Landesman |
Bigger Threats, Better Defense Tests of 16 security tools, including firewalls, antivirus software, and anti-spyware programs, that aim to foil worms, viruses, spies, and hackers. |
PC World September 2003 Sean Captain |
ZoneAlarm Gets Stronger The latest Pro version of Zone Labs' trusty firewall offers even more protection. |
RootPrompt.org April 10, 2000 Lance Spitzner |
Auditing Your Firewall How to Audit Your Firewall Setup. |
RootPrompt.org August 30, 2000 |
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. |
Inc. September 2004 Rod Kurtz |
Small Biz Braces for Life on the High (Priced) Seas Importers and exporters face a new era in port security -- and that could bring choppy waters for small companies. Homeland Security Secretary Tom Ridge has repeatedly said that industry should expect to absorb much of the cost for securing ports |
PC Magazine June 25, 2007 Neil J. Rubenking |
System Shield 3 Internet Security Don't rely on this suite to handle your computer's security... Norton 360... Outpost Security Suite Pro... |
IEEE Spectrum November 2005 Lauren Aaronson |
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. |
BusinessWeek March 6, 2006 Stanley Reed |
The Real Shipping News Behind the furor over the U.S. and Dubai shipping deal is a well-respected company with global reach. |
InternetNews January 22, 2004 Ryan Naraine |
Cisco Warns of Voice Product Security Flaws A repair script is released to fix a security flaw that leaves TCP and UDP ports open to malicious attack. |
PC Magazine August 17, 2004 Ellison & Caven |
Unleash Your Printer Reviews of six wireless print servers for the home and small office, and two for business use. Hawking HWPS12UG... Axis OfficeBasic USB... Belkin F1UP001... etc. |
InternetNews January 5, 2005 Sean Michael Kerner |
Hackers After Patched WINS Servers According to the Internet Storm Center (ISC) at the SANS Institute, hackers are trying to exploit an already patched Microsoft WINS Server vulnerability. |
InternetNews February 12, 2004 Ryan Naraine |
MyDoom Ends but Open Ports Attracting Mutants Microsoft releases a virus removal tool, but unpatched drone machines are still a major threat. |
PC Magazine October 1, 2003 Brett Glass |
Don't Let Your PC Become a Porn Zombie Protect your computer from takeover. We tell you how. |
PC Magazine February 14, 2007 |
Share A Wired Printer? Sharing a printer between two systems is easier with wi-fi networking. |
Inc. January 2004 Rod Kurtz |
Safer Harbors, Higher Fees New Coast Guard rules could make shipping more expensive. |
Linux Journal March 1, 2007 Sean Walberg |
How to Configure SIP and NAT Can you hear me now? Making VoIP work through a NAT gateway. |
PC Magazine February 2, 2005 Gottesman & Karagiannis |
A False Sense of Security Only 85 percent of the AOL/NCSA survey respondents were running antivirus software. Worse, while 71 percent of those people thought they were updating their protection at least weekly (including automatic updates), barely half of them actually were. |
Entrepreneur June 2004 Mike Hogan |
Not-So-Good Fellas Keep the bad guys at bay with these steps to improve your company's computer security. You can also try out these resources and Web sites for secure computing. |
InternetNews December 9, 2005 Sean Michael Kerner |
Do Hackers Look Before They Leap? University of Maryland researchers find that port scanning isn't necessarily a harbinger of an attack. |
PC Magazine October 5, 2006 Neil J. Rubenking |
Trend Micro Internet Security 2007 Trend Micro Internet Security 2007 still can't cure everything that ails your machine, but low price and online extras may make it an attractive option for some. |
PC Magazine December 30, 2003 Matthew D. Sarrel |
Network Security: Know Your Weaknesses Vulnerability scanners identify your network's insecurities. Which one of these 6 tested products will watch your back? |
InternetNews July 8, 2005 David Needle |
CERT Warns on Latest Trojan Horse Attacks Targeted e-mail viruses may be behind some recent Internet outages. The trojan horse viruses can evade anti-virus software and appear to be from a trusted source. |
New Architect November 2002 Al Williams |
Server Sandboxes Dedicated hosting without the hassle: deploy a single OS kernel on a single machine, but divide the kernel's system resources into multiple "lite" virtual servers, or sandboxes. |