MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC Magazine
October 5, 2004
Sheryl Canter
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. mark for My Articles similar articles
PC World
September 1, 2000
Jeff Sengstack
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. mark for My Articles similar articles
RootPrompt.org
September 7, 2000
Sander Plomp
Amateur Fortress Building in Linux Part 1 Sander Plomp is tired of articles telling you to edit inetd.conf. So he wrote this article that looks at how to turn your system into amateur fortress in some interesting ways. mark for My Articles similar articles
Unix Insider
November 2000
Sandra Henry-Stocker
Tapping on the walls Paring down your network services isn't the only way to protect your systems against attacks: port scanning can also be an effective tool. Here's how to stay one step ahead of your enemy... mark for My Articles similar articles
PC World
April 2001
Cameron Crouch & Sean Captain
Is Your PC Safe From the Enemy Within? Does your firewall have a hole in it? New updates fix a potentially disastrous flaw... mark for My Articles similar articles
PC Magazine
February 15, 2006
Matthew D. Sarrel
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. mark for My Articles similar articles
Unix Insider
October 2000
Sandra Henry-Stocker
Square one Security experts recommend turning off all network services you don't need in order to guard against possible attacks. But how do you know which services you don't need -- and which ones you do? A helpful breakdown of services that are safe to disable... mark for My Articles similar articles
PC World
December 2003
Scott Spanbauer
Ultimate Network Security: How to Install a Firewall Everything you need to know about selecting and installing a firewall for your PC or network. mark for My Articles similar articles
PC World
May 2005
Lincoln Spector
Hide Your Internet Ports From Snooping Hackers Closing open ports... Turning off Windows new program notification... Printing fonts and saving paper... etc. mark for My Articles similar articles
PC Magazine
October 1, 2004
Neil J. Rubenking
Personal Firewall--Don't Surf Without It To gauge the effectiveness of two popular firewall packages, we took the gloves off and attacked the firewall process using techniques available to a malicious program. McAfee Personal Firewall Plus 6.0... Norton Personal Firewall 2005... mark for My Articles similar articles
RootPrompt.org
June 26, 2000
Lance E. Spitzner
Knowing When Someone Is Knocking Lance E. Spitzner tells us how you can protect yourself by detecting intrusion attempts and then covers what you can do about them. mark for My Articles similar articles
RootPrompt.org
September 11, 2000
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... mark for My Articles similar articles
Linux Journal
March 2, 2007
Michael Rash
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. mark for My Articles similar articles
PC Magazine
August 3, 2005
Ryan Naraine
TCP Port Attack Imminent? An ominous increase in sniffing activity on TCP Port 445 could signal an impending attack targeting a recently patched Microsoft vulnerability. mark for My Articles similar articles
PC World
March 11, 2001
Top 5 Firewall Utilities Protect your PC from suspicious activity on your network or the Internet... mark for My Articles similar articles
Linux Journal
May 1, 2002
Pedro Paulo Ferreira Bueno
Understanding IDS for Linux A discussion of the different types of intrusion detection systems and how to create signatures to identify attacks... mark for My Articles similar articles
PC World
December 11, 2000
Sean Captain
Security Crusader Punches Holes in Firewalls Gibson's simple Trojan horse tricks firewalls from McAfee.com, Symantec, Sygate, and more... mark for My Articles similar articles
PC Magazine
June 22, 2005
Larry Seltzer
Make Your Network Safer by Attacking It A number of excellent tools can help you find out where you're network is vulnerable. mark for My Articles similar articles
Macworld
May 23, 2006
Jeffery Battersby
Norton Personal Firewall 3.0.3 Easy configuration option for the firewall faint of heart mark for My Articles similar articles
PC World
December 2005
Stuart J. Johnston
Windows Bug Allows Repeat Invasions Microsoft recently released a Security Advisory for a Firewall quirk... Avoid a fake Google site... A problem with Windows updates... Fix Wi-Fi router problems... mark for My Articles similar articles
PC Magazine
February 2, 2005
Robert P. Lipschutz
Lock Down Your Network When it comes to security, small and midsize businesses (SMBs) often find themselves in an uncomfortable position. They share many of the same security fears that threaten multinational enterprises. mark for My Articles similar articles
PC World
October 2002
Kalpana Narayanamurthi
Old Ports for New Notes Ultralight unit the size of a cell phone packs four ports for notebook use. mark for My Articles similar articles
PC World
May 2001
Scott Spanbauer
Hunt Down Those Hackers and ... Ignore Them? Uncover possible hackers... customize IE's title bar... install Winamp... mark for My Articles similar articles
PC World
November 2003
Andrew Brandt
Privacy Watch: Make Sure Your Firewall Is Sturdy Test your firewall to find out if it has any holes -- and then plug them up. mark for My Articles similar articles
PC Magazine
August 3, 2004
Keep Your PC Safe Learn to wield your firewall, antivirus, and antispyware tools expertly; don't give up your PC without a fight. mark for My Articles similar articles
PC World
January 2001
Alan Stafford
Warp Speed Web Access: Sharing the Bandwidth Broadband routers give your network a protected connection to the Internet... mark for My Articles similar articles
Linux Journal
January 30, 2006
What Application Do You Want Ported to Linux? Are you waiting -- patiently or not -- for one application finally to be ported to Linux to make your life easier? Novell wants to know what it is. mark for My Articles similar articles
PC World
June 2004
Mary Landesman
Bigger Threats, Better Defense Tests of 16 security tools, including firewalls, antivirus software, and anti-spyware programs, that aim to foil worms, viruses, spies, and hackers. mark for My Articles similar articles
PC World
September 2003
Sean Captain
ZoneAlarm Gets Stronger The latest Pro version of Zone Labs' trusty firewall offers even more protection. mark for My Articles similar articles
RootPrompt.org
April 10, 2000
Lance Spitzner
Auditing Your Firewall How to Audit Your Firewall Setup. mark for My Articles similar articles
RootPrompt.org
August 30, 2000
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. mark for My Articles similar articles
Inc.
September 2004
Rod Kurtz
Small Biz Braces for Life on the High (Priced) Seas Importers and exporters face a new era in port security -- and that could bring choppy waters for small companies. Homeland Security Secretary Tom Ridge has repeatedly said that industry should expect to absorb much of the cost for securing ports mark for My Articles similar articles
PC Magazine
June 25, 2007
Neil J. Rubenking
System Shield 3 Internet Security Don't rely on this suite to handle your computer's security... Norton 360... Outpost Security Suite Pro... mark for My Articles similar articles
IEEE Spectrum
November 2005
Lauren Aaronson
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. mark for My Articles similar articles
BusinessWeek
March 6, 2006
Stanley Reed
The Real Shipping News Behind the furor over the U.S. and Dubai shipping deal is a well-respected company with global reach. mark for My Articles similar articles
InternetNews
January 22, 2004
Ryan Naraine
Cisco Warns of Voice Product Security Flaws A repair script is released to fix a security flaw that leaves TCP and UDP ports open to malicious attack. mark for My Articles similar articles
PC Magazine
August 17, 2004
Ellison & Caven
Unleash Your Printer Reviews of six wireless print servers for the home and small office, and two for business use. Hawking HWPS12UG... Axis OfficeBasic USB... Belkin F1UP001... etc. mark for My Articles similar articles
InternetNews
January 5, 2005
Sean Michael Kerner
Hackers After Patched WINS Servers According to the Internet Storm Center (ISC) at the SANS Institute, hackers are trying to exploit an already patched Microsoft WINS Server vulnerability. mark for My Articles similar articles
InternetNews
February 12, 2004
Ryan Naraine
MyDoom Ends but Open Ports Attracting Mutants Microsoft releases a virus removal tool, but unpatched drone machines are still a major threat. mark for My Articles similar articles
PC Magazine
October 1, 2003
Brett Glass
Don't Let Your PC Become a Porn Zombie Protect your computer from takeover. We tell you how. mark for My Articles similar articles
PC Magazine
February 14, 2007
Share A Wired Printer? Sharing a printer between two systems is easier with wi-fi networking. mark for My Articles similar articles
Inc.
January 2004
Rod Kurtz
Safer Harbors, Higher Fees New Coast Guard rules could make shipping more expensive. mark for My Articles similar articles
Linux Journal
March 1, 2007
Sean Walberg
How to Configure SIP and NAT Can you hear me now? Making VoIP work through a NAT gateway. mark for My Articles similar articles
PC Magazine
February 2, 2005
Gottesman & Karagiannis
A False Sense of Security Only 85 percent of the AOL/NCSA survey respondents were running antivirus software. Worse, while 71 percent of those people thought they were updating their protection at least weekly (including automatic updates), barely half of them actually were. mark for My Articles similar articles
Entrepreneur
June 2004
Mike Hogan
Not-So-Good Fellas Keep the bad guys at bay with these steps to improve your company's computer security. You can also try out these resources and Web sites for secure computing. mark for My Articles similar articles
InternetNews
December 9, 2005
Sean Michael Kerner
Do Hackers Look Before They Leap? University of Maryland researchers find that port scanning isn't necessarily a harbinger of an attack. mark for My Articles similar articles
PC Magazine
October 5, 2006
Neil J. Rubenking
Trend Micro Internet Security 2007 Trend Micro Internet Security 2007 still can't cure everything that ails your machine, but low price and online extras may make it an attractive option for some. mark for My Articles similar articles
PC Magazine
December 30, 2003
Matthew D. Sarrel
Network Security: Know Your Weaknesses Vulnerability scanners identify your network's insecurities. Which one of these 6 tested products will watch your back? mark for My Articles similar articles
InternetNews
July 8, 2005
David Needle
CERT Warns on Latest Trojan Horse Attacks Targeted e-mail viruses may be behind some recent Internet outages. The trojan horse viruses can evade anti-virus software and appear to be from a trusted source. mark for My Articles similar articles
New Architect
November 2002
Al Williams
Server Sandboxes Dedicated hosting without the hassle: deploy a single OS kernel on a single machine, but divide the kernel's system resources into multiple "lite" virtual servers, or sandboxes. mark for My Articles similar articles