Similar Articles |
|
Linux Journal January 2001 Mick Bauer |
The 101 Uses of OpenSSH: Part I This article covers ssh's background and architecture, how to build and/or install OpenSSH, how to use ssh as an encrypted replacement for Telnet, how to set some basic ssh configuration options and how to use scp for encrypted file transfers... |
Linux Journal January 2, 2002 Jose Nazario |
A Rough Year for SSH In 2001, ssh was found to have several security flaws and has improved thanks to its trials... |
Linux Journal December 22, 2001 Jeremy D. Impson |
VNC, Securely: Part 2 Secure, transparent and ubiquitous desktops with VNC and OpenSSH... |
RootPrompt.org August 30, 2000 |
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. |
Linux Journal March 2, 2007 Michael Rash |
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. |
InternetNews September 22, 2005 Sean Michael Kerner |
SSH Hardens the Secure Shell The originator of the ubiquitous SSH protocol rolls out new solutions for enterprise file transfers. The company says its new version is enterprise grade, and that the open source version is not. |
Macworld October 25, 2005 Andrew T. Laurence |
Timbuktu Pro 8.5 Worthy upgrade stresses security and encryption of network connections and has better Tiger compatibility. |
PC Magazine January 18, 2006 Anil Hemrajani |
Free Access to Your PC from Anywhere VNC (Virtual Network Computing) lets you control a Windows, Linux, or Apple machine from any Internet-connected system. |
Linux Journal December 1, 2006 Paul Sery |
Tighter SSH Security with Two-Factor Authentication How to set up two-factor authentication using a USB pendrive and ssh-agent for root logins. |
Linux Journal January 1, 2003 Adam Lazur |
Power Sessions with Screen Screen is a terminal multiplexer that allows you to manage many processes through one physical terminal. Each process gets its own virtual window, and you can bounce between virtual windows interacting with each process. |
Linux Journal February 1, 2002 Rory Krause |
Using ssh Port Forwarding to Print at Remote Locations This article shows you how to connect the printing systems on different networks across the Internet in a secure manner... |
Linux Journal January 1, 2007 Andrew De Ponte |
An Automated Reliable Backup Solution Creating an unattended, encrypted, redundant, network backup solution using Linux, Duplicity and COTS hardware. |
Linux Journal August 2000 Reuven M. Lerner |
At the Forge Session Management with Mason. This Perl-based web helper and MySQL work together to let you quickly build a user registration system for your web site. |
InternetNews April 29, 2005 Michael Singer |
Paul Kocher, President, Cryptography Research The man who designed SSL v3.0 talks about the latest security threats on the horizon and how cryptography can help solve them. |
JavaWorld December 2000 Thomas E. Davis, Craig Walker |
Take control of the servlet environment, Part 2 Implement a wrapper that gives you greater control over session management. Session state can be stored in the browser, in the server's memory, or in the database. You can have all three solutions at your fingertips, painlessly interchangeable... |
Linux Journal December 1, 2006 Lyle Frost |
Thinking Thin Connecting thin clients to Linux. |
RootPrompt.org April 24, 2000 Lance Spitzner |
Preparing Your Box For the Internet The basics of securing a Linux box. The examples provided here are based on Red Hat 6.0, but should apply to most Linux distributions. |
InternetNews August 30, 2004 Ryan Naraine |
Cisco Confirms DoS Flaws Cisco's IOS-powered devices at risk of Denial of Service attacks. |
Linux Journal October 2001 Charles Curley |
Review: Microlite BackupEDGE Version 01.01.08 BackupEDGE from Microlite is an excellent backup product. It has a flexible command-line and menu interface, will back up over networks and can be used for disaster recovery. Documentation is extensive and readily available. It is a proprietary product, priced competitively... |
PC Magazine September 14, 2011 Samara Lynn |
Hands On: Windows Server 8 Microsoft is calling Windows Server 8 a "game-changer." They might be right. |
New Architect March 2003 Brian Wilson |
Quest Spotlight on Web Servers 3 How can you gather meaningful statistics on remote systems without installing agent software? By using tools that are already installed. Spotlight can make use of existing FTP, SSH, telnet, rexec, and Windows file-share protocols. Unfortunately, this means potentially opening up security holes. |
Investment Advisor October 2010 Dan Skiles |
Server Rack -- Don't Forget Physical Security Make sure that your server is secure enough that someone can't walk in and carry it out without much work. |
Linux Journal November 29, 2005 Duncan Napier |
Build a Home Terabyte Backup System Using Linux Build a low-cost, terabyte-sized backup server using Linux and back up your digital audio files, digital images and digital movie recordings. |