MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Linux Journal
January 2001
Mick Bauer
The 101 Uses of OpenSSH: Part I This article covers ssh's background and architecture, how to build and/or install OpenSSH, how to use ssh as an encrypted replacement for Telnet, how to set some basic ssh configuration options and how to use scp for encrypted file transfers... mark for My Articles similar articles
Linux Journal
January 2, 2002
Jose Nazario
A Rough Year for SSH In 2001, ssh was found to have several security flaws and has improved thanks to its trials... mark for My Articles similar articles
Linux Journal
December 22, 2001
Jeremy D. Impson
VNC, Securely: Part 2 Secure, transparent and ubiquitous desktops with VNC and OpenSSH... mark for My Articles similar articles
RootPrompt.org
August 30, 2000
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. mark for My Articles similar articles
Linux Journal
March 2, 2007
Michael Rash
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. mark for My Articles similar articles
InternetNews
September 22, 2005
Sean Michael Kerner
SSH Hardens the Secure Shell The originator of the ubiquitous SSH protocol rolls out new solutions for enterprise file transfers. The company says its new version is enterprise grade, and that the open source version is not. mark for My Articles similar articles
Macworld
October 25, 2005
Andrew T. Laurence
Timbuktu Pro 8.5 Worthy upgrade stresses security and encryption of network connections and has better Tiger compatibility. mark for My Articles similar articles
PC Magazine
January 18, 2006
Anil Hemrajani
Free Access to Your PC from Anywhere VNC (Virtual Network Computing) lets you control a Windows, Linux, or Apple machine from any Internet-connected system. mark for My Articles similar articles
Linux Journal
December 1, 2006
Paul Sery
Tighter SSH Security with Two-Factor Authentication How to set up two-factor authentication using a USB pendrive and ssh-agent for root logins. mark for My Articles similar articles
Linux Journal
January 1, 2003
Adam Lazur
Power Sessions with Screen Screen is a terminal multiplexer that allows you to manage many processes through one physical terminal. Each process gets its own virtual window, and you can bounce between virtual windows interacting with each process. mark for My Articles similar articles
Linux Journal
February 1, 2002
Rory Krause
Using ssh Port Forwarding to Print at Remote Locations This article shows you how to connect the printing systems on different networks across the Internet in a secure manner... mark for My Articles similar articles
Linux Journal
January 1, 2007
Andrew De Ponte
An Automated Reliable Backup Solution Creating an unattended, encrypted, redundant, network backup solution using Linux, Duplicity and COTS hardware. mark for My Articles similar articles
Linux Journal
August 2000
Reuven M. Lerner
At the Forge Session Management with Mason. This Perl-based web helper and MySQL work together to let you quickly build a user registration system for your web site. mark for My Articles similar articles
InternetNews
April 29, 2005
Michael Singer
Paul Kocher, President, Cryptography Research The man who designed SSL v3.0 talks about the latest security threats on the horizon and how cryptography can help solve them. mark for My Articles similar articles
JavaWorld
December 2000
Thomas E. Davis, Craig Walker
Take control of the servlet environment, Part 2 Implement a wrapper that gives you greater control over session management. Session state can be stored in the browser, in the server's memory, or in the database. You can have all three solutions at your fingertips, painlessly interchangeable... mark for My Articles similar articles
Linux Journal
December 1, 2006
Lyle Frost
Thinking Thin Connecting thin clients to Linux. mark for My Articles similar articles
RootPrompt.org
April 24, 2000
Lance Spitzner
Preparing Your Box For the Internet The basics of securing a Linux box. The examples provided here are based on Red Hat 6.0, but should apply to most Linux distributions. mark for My Articles similar articles
InternetNews
August 30, 2004
Ryan Naraine
Cisco Confirms DoS Flaws Cisco's IOS-powered devices at risk of Denial of Service attacks. mark for My Articles similar articles
Linux Journal
October 2001
Charles Curley
Review: Microlite BackupEDGE Version 01.01.08 BackupEDGE from Microlite is an excellent backup product. It has a flexible command-line and menu interface, will back up over networks and can be used for disaster recovery. Documentation is extensive and readily available. It is a proprietary product, priced competitively... mark for My Articles similar articles
PC Magazine
September 14, 2011
Samara Lynn
Hands On: Windows Server 8 Microsoft is calling Windows Server 8 a "game-changer." They might be right. mark for My Articles similar articles
New Architect
March 2003
Brian Wilson
Quest Spotlight on Web Servers 3 How can you gather meaningful statistics on remote systems without installing agent software? By using tools that are already installed. Spotlight can make use of existing FTP, SSH, telnet, rexec, and Windows file-share protocols. Unfortunately, this means potentially opening up security holes. mark for My Articles similar articles
Investment Advisor
October 2010
Dan Skiles
Server Rack -- Don't Forget Physical Security Make sure that your server is secure enough that someone can't walk in and carry it out without much work. mark for My Articles similar articles
Linux Journal
November 29, 2005
Duncan Napier
Build a Home Terabyte Backup System Using Linux Build a low-cost, terabyte-sized backup server using Linux and back up your digital audio files, digital images and digital movie recordings. mark for My Articles similar articles