Similar Articles |
|
Linux Journal December 1, 2006 Mick Bauer |
Paranoid Penguin - Running Network Services under User-Mode Linux, Part II Our objective is to use User-Mode Linux to create one or more virtual guest machines, each running a different network service. That way, if one application on one guest machine gets compromised somehow, others won't be affected. |
Linux Journal September 30, 2006 Mick Bauer |
Running Network Services under User-Mode Linux, Part I Learn to leverage the Linux kernel's virtualization features to isolate network daemons. For example, you could run Apache and BIND as separate guests so that a security hole in one will not leave the other exposed. |
Linux Journal September 2001 David A. Bandel |
Taming the Wild Netfilter Need to upgrade the moat on your castle? Here's how to use Netfilter and ipchains to increase security on home systems... |
Linux Journal April 1, 2007 Mick Bauer |
Paranoid Penguin - Linux Firewalls for Everyone Need a personal firewall, an enterprise Internet gateway or something in between? iptables does it all! |
Linux Journal June 1, 2002 David A. Bandel |
Kernel Korner: A NATural Progression A look at network address translation and how to avoid common errors when constructing iptables rules... |
Linux Journal April 1, 2007 Dinil Divakaran |
Starting a Linux Firewall from Scratch Here are the basic steps involved in developing a firewall from scratch, using tools in Linux. |
Linux Journal August 25, 2004 Christian Herzog |
Building a Diskless 2.6 Firewall For your next DIY project, pick up an old Pentium computer and a CompactFlash card and build a custom router/firewall using Linux. |
Linux Journal May 1, 2007 Michael Rash |
Protecting SSH Servers with Single Packet Authorization Lock down access to SSH with Single Packet Authorization. With this setup on a Linux system, no one will be able to tell that SSHD is even listening under an nmap scan, and only authenticated and authorized clients will be able to communicate with SSHD. |
Linux Journal August 1, 2007 Chou et al. |
Standard Operating Procedures for Embedded Linux Systems You can follow the procedures discussed in this article for building an Linux-based embedded system prototype. Also, we methods for downsizing your system. |
Linux Journal May 1, 2002 Greg Kroah-Hartman |
How the PCI Hot Plug Driver Filesystem Works How the PCI Hot Plug core implements a RAM-based filesystem and how you can do the same for your drivers... |
Macworld May 17, 2005 Robert Ellis |
Guest PC 1.2 Guest PC 1.2 lets you run a virtual Windows computer on your Mac. At almost half the price of Virtual PC 7 (which costs $129 in a similar configuration), some users will find it a money-saving way to run the occasional Windows program. |
Linux Journal July 20, 2001 Cliff Brake |
Flash Filesystems for Embedded Linux Systems Flash isn't only a hard disk with no moving parts. This article shows you how to combine filesystem technologies to make the best use of Flash. |
Linux Journal April 1, 2007 Nicholas Petreley |
/var/opinion - Do Not Forget What People Fetch How to use iptables to route web surfing through a protective filter. |
InternetNews December 24, 2008 Sean Michael Kerner |
Gifts for All in Linux 2.6.28 Graphics performance, wireless USB support and power utilization improvements top the Linux stocking stuffers in new release. |
InternetNews September 20, 2006 Sean Michael Kerner |
Pirate Linux Kernel 2.6.18 Hits The 2.6.18 kernel includes a long list of functional updates and improvements. |