Similar Articles |
|
Unix Insider December 2000 Sandra Henry-Stocker |
OS identification When hackers plan to break into Websites, they first try to find out which operating system the site is using. Once they determine that and which services are running, their chances of successfully attacking a system are greatly increased. What can you do to stop them? |
RootPrompt.org June 14, 2000 |
The Secrets of Snoop Lance Spitzner tell us about the secrets of Snoop: A passive approach to your network security. |
RootPrompt.org May 7, 2001 |
Testing a Router or Firewall We do not present a generic high level method. Indeed, every network administrator has its own way to set up a device or to solve a problem. We emphasize on the low level method by presenting key points, which can be linked together in order to construct the method of every person... |
PC Magazine April 6, 2005 David A. Karp |
Control a PC for Free With a remote control solution, you sit in front of one computer and view the desktop of another computer in a window. |
Linux Journal March 2, 2007 Michael Rash |
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. |
Linux Journal February 1, 2002 Gianluca Insolvibile |
Inside the Linux Packet Filter In Part I of this two-part series on the Linux Packet Filter, the author describes a packet's journey through the kernel... |
Linux Journal April 1, 2007 Dinil Divakaran |
Starting a Linux Firewall from Scratch Here are the basic steps involved in developing a firewall from scratch, using tools in Linux. |
PC World July 2005 Scott Dunn |
Access Your Files and Apps From Anywhere for Free Use a built-in Windows tool to reach your office PC's files remotely from the road... Back up Outlook files easily... |
Wired October 2000 Jerome Kuptz |
Independence Array How Gnutella and Napster actually work... |
T.H.E. Journal March 2005 Dan Young |
VoIP in a Campus Environment VoIP telephony increases efficiency and lowers costs for businesses. It is also a recruiting tool in higher education. |
Macworld June 1, 2006 Anton Linecker |
Apple Remote Desktop 3 Apple Remote Desktop 3 is an essential program for any IT professional who needs to manage Macs remotely. Despite some bugs and a relatively weak reporting feature, the sheer number of tools available is amazing. |
RootPrompt.org May 10, 2000 Noel |
Cracked! Part 2: Watching and Waiting In the second article Noel continues the story of when some Unix boxes that he helped admin were cracked. This article talks about watching the cracker with a sniffer and talking to the the FBI's Computer Crimes Squad.... |
Home Theater October 30, 2005 Darryl Wilkinson |
Step Away from the Remote Control PRISM Sales International believes it has found a way to end the agony of the lost remote. |