MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
RootPrompt.org
September 13, 2000
Sander Plomp
Amateur Fortress Building in Linux Part 2 Of course, deep down there is always some potential for catastrophic security hole - in the TCP stack, the kernel, whatever. That is inevitable. I can live with that. I just don't want it to be a biweekly event... mark for My Articles similar articles
Unix Insider
October 2000
Sandra Henry-Stocker
Square one Security experts recommend turning off all network services you don't need in order to guard against possible attacks. But how do you know which services you don't need -- and which ones you do? A helpful breakdown of services that are safe to disable... mark for My Articles similar articles
Linux Journal
November 29, 2001
Eric Jorn Seneca
sendmail: Introduction and Configuration A guide for those of you configuring your first e-mail server... mark for My Articles similar articles
RootPrompt.org
September 11, 2000
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... mark for My Articles similar articles
RootPrompt.org
April 24, 2000
Lance Spitzner
Preparing Your Box For the Internet The basics of securing a Linux box. The examples provided here are based on Red Hat 6.0, but should apply to most Linux distributions. mark for My Articles similar articles
Linux Journal
December 1, 2006
George Belotsky
A Server (Almost) of Your Own A virtual private server gives you root access without the high cost of a dedicated server. Here is how to set up e-mail on a VPS. mark for My Articles similar articles
Linux Journal
March 2000
Jeff Regan
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. mark for My Articles similar articles
Linux Journal
December 1, 2002
Mick Bauer
Configuring and Using an FTP Proxy How to add a layer of security between the bad guys and your public FTP servers. mark for My Articles similar articles
PC Magazine
October 28, 2003
Brett Glass
Batten Down Those Ports Don't let malicious intruders find a way into your system. We tell you how they try to sneak in -- and how to keep them out. mark for My Articles similar articles
Linux Journal
October 14, 2002
Wayne Marshall
Radio E-mail in West Africa: The Complete Version Remote networking with high-frequency (HF) radio and qmail. mark for My Articles similar articles
RootPrompt.org
June 26, 2000
Lance E. Spitzner
Knowing When Someone Is Knocking Lance E. Spitzner tells us how you can protect yourself by detecting intrusion attempts and then covers what you can do about them. mark for My Articles similar articles
RootPrompt.org
June 7, 2000
Lance Spitzner
Know Your Enemy: A Forensic Analysis A study of an attack on a system. Instead of focusing on the tools and tactics used, he focuses on how he learned what happened and pieced the information together. The purpose is to give you the forensic skills necessary to analyze and learn the threats your organization faces... mark for My Articles similar articles
Linux Journal
September 2001
Ron Hume
Configuring xdm For both convenience and flexibility, xdm offers a useful way to manage X sessions... mark for My Articles similar articles
RootPrompt.org
August 30, 2000
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. mark for My Articles similar articles
Linux Journal
August 25, 2004
Christian Herzog
Building a Diskless 2.6 Firewall For your next DIY project, pick up an old Pentium computer and a CompactFlash card and build a custom router/firewall using Linux. mark for My Articles similar articles
Unix Insider
November 2000
Sandra Henry-Stocker
Tapping on the walls Paring down your network services isn't the only way to protect your systems against attacks: port scanning can also be an effective tool. Here's how to stay one step ahead of your enemy... mark for My Articles similar articles
Linux Journal
March 2, 2007
Michael Rash
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. mark for My Articles similar articles
RootPrompt.org
August 28, 2000
Security Etiquette So what is the proper etiquette for contacting the SysAdmin of a cracked box? mark for My Articles similar articles
PC Magazine
August 17, 2004
Ellison & Caven
Unleash Your Printer Reviews of six wireless print servers for the home and small office, and two for business use. Hawking HWPS12UG... Axis OfficeBasic USB... Belkin F1UP001... etc. mark for My Articles similar articles
PC World
May 2005
Lincoln Spector
Hide Your Internet Ports From Snooping Hackers Closing open ports... Turning off Windows new program notification... Printing fonts and saving paper... etc. mark for My Articles similar articles
Popular Mechanics
June 2007
Joel Johnson
Hack Attack: Is the Whole Internet at Risk? Some hackers recently tried to take down the entire World Wide Web. You didn't even notice because the Internet is so robust. mark for My Articles similar articles
IEEE Spectrum
December 2008
Bob Briscoe
A Fairer, Faster Internet Protocol TCP -- the way we share bandwidth -- needs a makeover. mark for My Articles similar articles