Similar Articles |
|
RootPrompt.org September 13, 2000 Sander Plomp |
Amateur Fortress Building in Linux Part 2 Of course, deep down there is always some potential for catastrophic security hole - in the TCP stack, the kernel, whatever. That is inevitable. I can live with that. I just don't want it to be a biweekly event... |
Unix Insider October 2000 Sandra Henry-Stocker |
Square one Security experts recommend turning off all network services you don't need in order to guard against possible attacks. But how do you know which services you don't need -- and which ones you do? A helpful breakdown of services that are safe to disable... |
Linux Journal November 29, 2001 Eric Jorn Seneca |
sendmail: Introduction and Configuration A guide for those of you configuring your first e-mail server... |
RootPrompt.org September 11, 2000 |
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... |
RootPrompt.org April 24, 2000 Lance Spitzner |
Preparing Your Box For the Internet The basics of securing a Linux box. The examples provided here are based on Red Hat 6.0, but should apply to most Linux distributions. |
Linux Journal December 1, 2006 George Belotsky |
A Server (Almost) of Your Own A virtual private server gives you root access without the high cost of a dedicated server. Here is how to set up e-mail on a VPS. |
Linux Journal March 2000 Jeff Regan |
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. |
Linux Journal December 1, 2002 Mick Bauer |
Configuring and Using an FTP Proxy How to add a layer of security between the bad guys and your public FTP servers. |
PC Magazine October 28, 2003 Brett Glass |
Batten Down Those Ports Don't let malicious intruders find a way into your system. We tell you how they try to sneak in -- and how to keep them out. |
Linux Journal October 14, 2002 Wayne Marshall |
Radio E-mail in West Africa: The Complete Version Remote networking with high-frequency (HF) radio and qmail. |
RootPrompt.org June 26, 2000 Lance E. Spitzner |
Knowing When Someone Is Knocking Lance E. Spitzner tells us how you can protect yourself by detecting intrusion attempts and then covers what you can do about them. |
RootPrompt.org June 7, 2000 Lance Spitzner |
Know Your Enemy: A Forensic Analysis A study of an attack on a system. Instead of focusing on the tools and tactics used, he focuses on how he learned what happened and pieced the information together. The purpose is to give you the forensic skills necessary to analyze and learn the threats your organization faces... |
Linux Journal September 2001 Ron Hume |
Configuring xdm For both convenience and flexibility, xdm offers a useful way to manage X sessions... |
RootPrompt.org August 30, 2000 |
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. |
Linux Journal August 25, 2004 Christian Herzog |
Building a Diskless 2.6 Firewall For your next DIY project, pick up an old Pentium computer and a CompactFlash card and build a custom router/firewall using Linux. |
Unix Insider November 2000 Sandra Henry-Stocker |
Tapping on the walls Paring down your network services isn't the only way to protect your systems against attacks: port scanning can also be an effective tool. Here's how to stay one step ahead of your enemy... |
Linux Journal March 2, 2007 Michael Rash |
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. |
RootPrompt.org August 28, 2000 |
Security Etiquette So what is the proper etiquette for contacting the SysAdmin of a cracked box? |
PC Magazine August 17, 2004 Ellison & Caven |
Unleash Your Printer Reviews of six wireless print servers for the home and small office, and two for business use. Hawking HWPS12UG... Axis OfficeBasic USB... Belkin F1UP001... etc. |
PC World May 2005 Lincoln Spector |
Hide Your Internet Ports From Snooping Hackers Closing open ports... Turning off Windows new program notification... Printing fonts and saving paper... etc. |
Popular Mechanics June 2007 Joel Johnson |
Hack Attack: Is the Whole Internet at Risk? Some hackers recently tried to take down the entire World Wide Web. You didn't even notice because the Internet is so robust. |
IEEE Spectrum December 2008 Bob Briscoe |
A Fairer, Faster Internet Protocol TCP -- the way we share bandwidth -- needs a makeover. |