MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
RootPrompt.org
September 7, 2000
Sander Plomp
Amateur Fortress Building in Linux Part 1 Sander Plomp is tired of articles telling you to edit inetd.conf. So he wrote this article that looks at how to turn your system into amateur fortress in some interesting ways. mark for My Articles similar articles
PC Magazine
October 5, 2004
Sheryl Canter
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. mark for My Articles similar articles
Linux Journal
March 2000
Jeff Regan
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. mark for My Articles similar articles
Linux Journal
April 1, 2007
Mick Bauer
Paranoid Penguin - Linux Firewalls for Everyone Need a personal firewall, an enterprise Internet gateway or something in between? iptables does it all! mark for My Articles similar articles
RootPrompt.org
April 24, 2000
Lance Spitzner
Preparing Your Box For the Internet The basics of securing a Linux box. The examples provided here are based on Red Hat 6.0, but should apply to most Linux distributions. mark for My Articles similar articles
PC Magazine
August 3, 2004
Keep Your PC Safe Learn to wield your firewall, antivirus, and antispyware tools expertly; don't give up your PC without a fight. mark for My Articles similar articles
Linux Journal
November 29, 2001
Eric Jorn Seneca
sendmail: Introduction and Configuration A guide for those of you configuring your first e-mail server... mark for My Articles similar articles
RootPrompt.org
September 11, 2000
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... mark for My Articles similar articles
RootPrompt.org
April 10, 2000
Lance Spitzner
Auditing Your Firewall How to Audit Your Firewall Setup. mark for My Articles similar articles
Linux Journal
August 25, 2004
Christian Herzog
Building a Diskless 2.6 Firewall For your next DIY project, pick up an old Pentium computer and a CompactFlash card and build a custom router/firewall using Linux. mark for My Articles similar articles
PC Magazine
March 2, 2004
Davis D. Janowski
Small-Business Security For cash-strapped, IT-barren companies, all-in-one security appliances offer affordable protection. Here's how to make one work for your network. mark for My Articles similar articles
Linux Journal
December 12, 2006
Dempster & Eaton-Lee
Excerpt from the book "Configuring IPCop Firewalls: Closing Borders with Open Source" IPCop is a firewall for the Small Office/Home Office network, which is extremely easy to use and is released under the GPL. This excerpt outlines a few common methods of deploying IPCop and the motivation behind these topologies along with descriptions of some of the features you can deploy. mark for My Articles similar articles
Linux Journal
April 1, 2007
Dinil Divakaran
Starting a Linux Firewall from Scratch Here are the basic steps involved in developing a firewall from scratch, using tools in Linux. mark for My Articles similar articles
PC World
September 1, 2000
Jeff Sengstack
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. mark for My Articles similar articles
Linux Journal
July 2000
Robert Dobozy
Product Review: Medusa DS9 Security System Imagine a perfectly secured Linux box. Now imagine a new bug in Sendmail or ftpd, hundreds of relatively unknown users using many better- or worse-written setuid programs. Hmmm. Can you sleep well? I have something for you. Its name is Medusa DS9. It's not perfect, but it is a very interesting piece of software. mark for My Articles similar articles
RootPrompt.org
August 30, 2000
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. mark for My Articles similar articles
PC Magazine
February 15, 2006
Matthew D. Sarrel
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. mark for My Articles similar articles
RootPrompt.org
June 7, 2000
Lance Spitzner
Know Your Enemy: A Forensic Analysis A study of an attack on a system. Instead of focusing on the tools and tactics used, he focuses on how he learned what happened and pieced the information together. The purpose is to give you the forensic skills necessary to analyze and learn the threats your organization faces... mark for My Articles similar articles
Linux Journal
March 2000
Tristan Greaves
Network Monitoring with Linux Are you having trouble keeping your network under control? Here is an introduction to NOCOL: the freeware network monitoring system which will help you keep instability at bay. mark for My Articles similar articles
PC World
December 2003
Scott Spanbauer
Ultimate Network Security: How to Install a Firewall Everything you need to know about selecting and installing a firewall for your PC or network. mark for My Articles similar articles
Linux Journal
December 1, 2006
Mick Bauer
Paranoid Penguin - Running Network Services under User-Mode Linux, Part II Our objective is to use User-Mode Linux to create one or more virtual guest machines, each running a different network service. That way, if one application on one guest machine gets compromised somehow, others won't be affected. mark for My Articles similar articles
InternetNews
December 14, 2007
Sean Michael Kerner
Security and the Politics of Fear A No Nonsense top 10 list for IT security. mark for My Articles similar articles
PC Magazine
September 21, 2004
NAT Enough? A home router is not a complete security solution. mark for My Articles similar articles
PC World
December 11, 2000
Sean Captain
Security Crusader Punches Holes in Firewalls Gibson's simple Trojan horse tricks firewalls from McAfee.com, Symantec, Sygate, and more... mark for My Articles similar articles
Macworld
September 12, 2005
Matt Vance
DoorStop X 1.0 Open Door Networks' software firewall has a simple interface and offers easy security customization. mark for My Articles similar articles
Linux Journal
September 30, 2006
Albert Martorell
SMART (Smart Monitoring and Rebooting Tool) If you want an agent to monitor and control services, you'll need to get SMART. It's wonderful having a colleague who is checking that everything works correctly 24/7 and who informs you about troubles after they already have been solved. mark for My Articles similar articles
PC World
October 2004
Scott Spanbauer
Tweak Windows XP SP2 Security to Your Advantage Fine-tune the settings in Microsoft's recently released Windows XP Service Pack 2. mark for My Articles similar articles
PC World
April 2001
Cameron Crouch & Sean Captain
Is Your PC Safe From the Enemy Within? Does your firewall have a hole in it? New updates fix a potentially disastrous flaw... mark for My Articles similar articles
Macworld
May 2001
Mel Beckman
Norton Personal Firewall 1.0 Internet-protection software for individual users needs beefing up... mark for My Articles similar articles
PC Magazine
December 12, 2007
Neil J. Rubenking
Security Suites 2008 Threats lined up against your PC have never been worse. But don't panic; there also has never been a better selection of security suites available to keep your system safe. mark for My Articles similar articles
PC World
November 2003
Andrew Brandt
Privacy Watch: Make Sure Your Firewall Is Sturdy Test your firewall to find out if it has any holes -- and then plug them up. mark for My Articles similar articles
InternetNews
March 7, 2005
Sean Michael Kerner
'Land' Bug Back to Bedevil Microsoft Servers Windows Server 2003 and XP SP2 machines without properly configured firewalls are at risk of a Denial of Service attack via the "LAND" bug, according to a security researcher. mark for My Articles similar articles
Popular Mechanics
June 2007
Joel Johnson
Hack Attack: Is the Whole Internet at Risk? Some hackers recently tried to take down the entire World Wide Web. You didn't even notice because the Internet is so robust. mark for My Articles similar articles
PC World
March 11, 2001
Top 5 Firewall Utilities Protect your PC from suspicious activity on your network or the Internet... mark for My Articles similar articles
PC Magazine
August 3, 2004
Security Checklist Follow this computer security checklist to keep your business safe. mark for My Articles similar articles
PC Magazine
October 1, 2004
Neil J. Rubenking
Personal Firewall--Don't Surf Without It To gauge the effectiveness of two popular firewall packages, we took the gloves off and attacked the firewall process using techniques available to a malicious program. McAfee Personal Firewall Plus 6.0... Norton Personal Firewall 2005... mark for My Articles similar articles
PC World
June 21, 2007
Erik Larkin
Surprise! You May Have More Firewall Than You Need Windows Vista's firewall doesn't come with outbound filtering turned on, but does it matter? mark for My Articles similar articles
Macworld
May 24, 2006
Jeffery Battersby
Mac OS X Firewall OS X's built-in firewall is enough for most users mark for My Articles similar articles
Macworld
May 22, 2006
Jeffery Battersby
IPNetSentryX Powerful intrusion detector for experts only mark for My Articles similar articles
InternetNews
December 12, 2005
Jim Wagner
Angling to Guard Inside Information Security company Oakley takes aim at network leaks that happen behind the firewall, not malicious hackers from the outside. mark for My Articles similar articles
PC Magazine
October 4, 2006
Neil J. Rubenking
Norton Internet Security 2007 Symantec's latest version of its all-inclusive protection software, Norton Internet Security 2007, offers top-flight protection without getting in your face. mark for My Articles similar articles
InternetNews
May 20, 2011
Sean Michael Kerner
Fedora 15 Linux Gets Dynamic Firewall Tech Linux distro debuts a new type of firewall that enables users and applications to open and close ports on the fly. mark for My Articles similar articles
PC Magazine
September 23, 2011
Jill Duffy
A Concise Guide to Android Rooting Why, how, and 'what now?' for rooting an Android phone, plus 7 apps for root users. mark for My Articles similar articles
PC Magazine
April 18, 2007
Russell Morgan
Essential Security: Firewalls Businesses, like homes, must be locked up tight to keep out crooks. mark for My Articles similar articles
PC World
August 2003
Stan Miastkowski
Step-By-Step: Bulletproof Your PC With a Software Firewall For any computer with an Internet connection, a firewall is essential. Here are the setup basics. mark for My Articles similar articles
Macworld
May 22, 2006
Jeffery Battersby
Flying Buttress 1.4 Firewall add-on sports excellent features, less-than-excellent documentation and support mark for My Articles similar articles
T.H.E. Journal
February 2005
Product Watch - Lightspeed Firewall Lightspeed Firewall provides well-integrated, multiple levels of security to create a comprehensive firewall. mark for My Articles similar articles
InternetNews
March 10, 2006
Sean Michael Kerner
Marcus Ranum, CSO, Tenable Network Security Firewall inventor Marcus Ranum sounds off on security threats and how open source doesn't necessarily make software better. mark for My Articles similar articles