MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Linux Journal
January 2, 2002
Jose Nazario
A Rough Year for SSH In 2001, ssh was found to have several security flaws and has improved thanks to its trials... mark for My Articles similar articles
Linux Journal
January 2001
Mick Bauer
The 101 Uses of OpenSSH: Part I This article covers ssh's background and architecture, how to build and/or install OpenSSH, how to use ssh as an encrypted replacement for Telnet, how to set some basic ssh configuration options and how to use scp for encrypted file transfers... mark for My Articles similar articles
Linux Journal
April 1, 2007
Girish Venkatachalam
The OpenSSH Protocol under the Hood The nitty-gritty details as to what OpenSSH is and why it is ubiquitous. mark for My Articles similar articles
Linux Journal
December 22, 2001
Jeremy D. Impson
VNC, Securely: Part 2 Secure, transparent and ubiquitous desktops with VNC and OpenSSH... mark for My Articles similar articles
PC Magazine
January 18, 2006
Anil Hemrajani
Free Access to Your PC from Anywhere VNC (Virtual Network Computing) lets you control a Windows, Linux, or Apple machine from any Internet-connected system. mark for My Articles similar articles
Linux Journal
December 1, 2006
Paul Sery
Tighter SSH Security with Two-Factor Authentication How to set up two-factor authentication using a USB pendrive and ssh-agent for root logins. mark for My Articles similar articles
Linux Journal
February 1, 2002
Rory Krause
Using ssh Port Forwarding to Print at Remote Locations This article shows you how to connect the printing systems on different networks across the Internet in a secure manner... mark for My Articles similar articles
Macworld
October 25, 2005
Andrew T. Laurence
Timbuktu Pro 8.5 Worthy upgrade stresses security and encryption of network connections and has better Tiger compatibility. mark for My Articles similar articles
InternetNews
August 30, 2004
Ryan Naraine
Cisco Confirms DoS Flaws Cisco's IOS-powered devices at risk of Denial of Service attacks. mark for My Articles similar articles
Linux Journal
January 1, 2007
Andrew De Ponte
An Automated Reliable Backup Solution Creating an unattended, encrypted, redundant, network backup solution using Linux, Duplicity and COTS hardware. mark for My Articles similar articles
New Architect
March 2003
Brian Wilson
Quest Spotlight on Web Servers 3 How can you gather meaningful statistics on remote systems without installing agent software? By using tools that are already installed. Spotlight can make use of existing FTP, SSH, telnet, rexec, and Windows file-share protocols. Unfortunately, this means potentially opening up security holes. mark for My Articles similar articles
InternetNews
March 30, 2004
Ryan Naraine
Malicious Cisco Code Circulating The release of a hacking toolkit to exploit security holes in Cisco products has sent the networking giant scrambling. mark for My Articles similar articles
RootPrompt.org
August 21, 2000
Securing Linux Mandrake As Linux Mandrake works its way away from its Red Hat roots, they've added a number of features "out of the box" that make it easier to use as a server. However, there are still a number of things that I do before considering a new install "ready" to be configured for offering any services. mark for My Articles similar articles