MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Unix Insider
December 2000
Sandra Henry-Stocker
OS identification When hackers plan to break into Websites, they first try to find out which operating system the site is using. Once they determine that and which services are running, their chances of successfully attacking a system are greatly increased. What can you do to stop them? mark for My Articles similar articles
RootPrompt.org
June 14, 2000
The Secrets of Snoop Lance Spitzner tell us about the secrets of Snoop: A passive approach to your network security. mark for My Articles similar articles
RootPrompt.org
May 7, 2001
Testing a Router or Firewall We do not present a generic high level method. Indeed, every network administrator has its own way to set up a device or to solve a problem. We emphasize on the low level method by presenting key points, which can be linked together in order to construct the method of every person... mark for My Articles similar articles
PC Magazine
April 6, 2005
David A. Karp
Control a PC for Free With a remote control solution, you sit in front of one computer and view the desktop of another computer in a window. mark for My Articles similar articles
Linux Journal
March 2, 2007
Michael Rash
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. mark for My Articles similar articles
Linux Journal
February 1, 2002
Gianluca Insolvibile
Inside the Linux Packet Filter In Part I of this two-part series on the Linux Packet Filter, the author describes a packet's journey through the kernel... mark for My Articles similar articles
Linux Journal
April 1, 2007
Dinil Divakaran
Starting a Linux Firewall from Scratch Here are the basic steps involved in developing a firewall from scratch, using tools in Linux. mark for My Articles similar articles
PC World
July 2005
Scott Dunn
Access Your Files and Apps From Anywhere for Free Use a built-in Windows tool to reach your office PC's files remotely from the road... Back up Outlook files easily... mark for My Articles similar articles
Wired
October 2000
Jerome Kuptz
Independence Array How Gnutella and Napster actually work... mark for My Articles similar articles
T.H.E. Journal
March 2005
Dan Young
VoIP in a Campus Environment VoIP telephony increases efficiency and lowers costs for businesses. It is also a recruiting tool in higher education. mark for My Articles similar articles
Macworld
June 1, 2006
Anton Linecker
Apple Remote Desktop 3 Apple Remote Desktop 3 is an essential program for any IT professional who needs to manage Macs remotely. Despite some bugs and a relatively weak reporting feature, the sheer number of tools available is amazing. mark for My Articles similar articles
RootPrompt.org
May 10, 2000
Noel
Cracked! Part 2: Watching and Waiting In the second article Noel continues the story of when some Unix boxes that he helped admin were cracked. This article talks about watching the cracker with a sniffer and talking to the the FBI's Computer Crimes Squad.... mark for My Articles similar articles
Home Theater
October 30, 2005
Darryl Wilkinson
Step Away from the Remote Control PRISM Sales International believes it has found a way to end the agony of the lost remote. mark for My Articles similar articles