Similar Articles |
|
RootPrompt.org September 7, 2000 Sander Plomp |
Amateur Fortress Building in Linux Part 1 Sander Plomp is tired of articles telling you to edit inetd.conf. So he wrote this article that looks at how to turn your system into amateur fortress in some interesting ways. |
PC Magazine October 5, 2004 Sheryl Canter |
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. |
Linux Journal March 2000 Jeff Regan |
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. |
Linux Journal April 1, 2007 Mick Bauer |
Paranoid Penguin - Linux Firewalls for Everyone Need a personal firewall, an enterprise Internet gateway or something in between? iptables does it all! |
RootPrompt.org April 24, 2000 Lance Spitzner |
Preparing Your Box For the Internet The basics of securing a Linux box. The examples provided here are based on Red Hat 6.0, but should apply to most Linux distributions. |
PC Magazine August 3, 2004 |
Keep Your PC Safe Learn to wield your firewall, antivirus, and antispyware tools expertly; don't give up your PC without a fight. |
Linux Journal November 29, 2001 Eric Jorn Seneca |
sendmail: Introduction and Configuration A guide for those of you configuring your first e-mail server... |
RootPrompt.org September 11, 2000 |
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... |
RootPrompt.org April 10, 2000 Lance Spitzner |
Auditing Your Firewall How to Audit Your Firewall Setup. |
Linux Journal August 25, 2004 Christian Herzog |
Building a Diskless 2.6 Firewall For your next DIY project, pick up an old Pentium computer and a CompactFlash card and build a custom router/firewall using Linux. |
PC Magazine March 2, 2004 Davis D. Janowski |
Small-Business Security For cash-strapped, IT-barren companies, all-in-one security appliances offer affordable protection. Here's how to make one work for your network. |
Linux Journal December 12, 2006 Dempster & Eaton-Lee |
Excerpt from the book "Configuring IPCop Firewalls: Closing Borders with Open Source" IPCop is a firewall for the Small Office/Home Office network, which is extremely easy to use and is released under the GPL. This excerpt outlines a few common methods of deploying IPCop and the motivation behind these topologies along with descriptions of some of the features you can deploy. |
Linux Journal April 1, 2007 Dinil Divakaran |
Starting a Linux Firewall from Scratch Here are the basic steps involved in developing a firewall from scratch, using tools in Linux. |
PC World September 1, 2000 Jeff Sengstack |
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. |
Linux Journal July 2000 Robert Dobozy |
Product Review: Medusa DS9 Security System Imagine a perfectly secured Linux box. Now imagine a new bug in Sendmail or ftpd, hundreds of relatively unknown users using many better- or worse-written setuid programs. Hmmm. Can you sleep well? I have something for you. Its name is Medusa DS9. It's not perfect, but it is a very interesting piece of software. |
RootPrompt.org August 30, 2000 |
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. |
PC Magazine February 15, 2006 Matthew D. Sarrel |
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. |
RootPrompt.org June 7, 2000 Lance Spitzner |
Know Your Enemy: A Forensic Analysis A study of an attack on a system. Instead of focusing on the tools and tactics used, he focuses on how he learned what happened and pieced the information together. The purpose is to give you the forensic skills necessary to analyze and learn the threats your organization faces... |
Linux Journal March 2000 Tristan Greaves |
Network Monitoring with Linux Are you having trouble keeping your network under control? Here is an introduction to NOCOL: the freeware network monitoring system which will help you keep instability at bay. |
PC World December 2003 Scott Spanbauer |
Ultimate Network Security: How to Install a Firewall Everything you need to know about selecting and installing a firewall for your PC or network. |
Linux Journal December 1, 2006 Mick Bauer |
Paranoid Penguin - Running Network Services under User-Mode Linux, Part II Our objective is to use User-Mode Linux to create one or more virtual guest machines, each running a different network service. That way, if one application on one guest machine gets compromised somehow, others won't be affected. |
InternetNews December 14, 2007 Sean Michael Kerner |
Security and the Politics of Fear A No Nonsense top 10 list for IT security. |
PC Magazine September 21, 2004 |
NAT Enough? A home router is not a complete security solution. |
PC World December 11, 2000 Sean Captain |
Security Crusader Punches Holes in Firewalls Gibson's simple Trojan horse tricks firewalls from McAfee.com, Symantec, Sygate, and more... |
Macworld September 12, 2005 Matt Vance |
DoorStop X 1.0 Open Door Networks' software firewall has a simple interface and offers easy security customization. |
Linux Journal September 30, 2006 Albert Martorell |
SMART (Smart Monitoring and Rebooting Tool) If you want an agent to monitor and control services, you'll need to get SMART. It's wonderful having a colleague who is checking that everything works correctly 24/7 and who informs you about troubles after they already have been solved. |
PC World October 2004 Scott Spanbauer |
Tweak Windows XP SP2 Security to Your Advantage Fine-tune the settings in Microsoft's recently released Windows XP Service Pack 2. |
PC World April 2001 Cameron Crouch & Sean Captain |
Is Your PC Safe From the Enemy Within? Does your firewall have a hole in it? New updates fix a potentially disastrous flaw... |
Macworld May 2001 Mel Beckman |
Norton Personal Firewall 1.0 Internet-protection software for individual users needs beefing up... |
PC Magazine December 12, 2007 Neil J. Rubenking |
Security Suites 2008 Threats lined up against your PC have never been worse. But don't panic; there also has never been a better selection of security suites available to keep your system safe. |
PC World November 2003 Andrew Brandt |
Privacy Watch: Make Sure Your Firewall Is Sturdy Test your firewall to find out if it has any holes -- and then plug them up. |
InternetNews March 7, 2005 Sean Michael Kerner |
'Land' Bug Back to Bedevil Microsoft Servers Windows Server 2003 and XP SP2 machines without properly configured firewalls are at risk of a Denial of Service attack via the "LAND" bug, according to a security researcher. |
Popular Mechanics June 2007 Joel Johnson |
Hack Attack: Is the Whole Internet at Risk? Some hackers recently tried to take down the entire World Wide Web. You didn't even notice because the Internet is so robust. |
PC World March 11, 2001 |
Top 5 Firewall Utilities Protect your PC from suspicious activity on your network or the Internet... |
PC Magazine August 3, 2004 |
Security Checklist Follow this computer security checklist to keep your business safe. |
PC Magazine October 1, 2004 Neil J. Rubenking |
Personal Firewall--Don't Surf Without It To gauge the effectiveness of two popular firewall packages, we took the gloves off and attacked the firewall process using techniques available to a malicious program. McAfee Personal Firewall Plus 6.0... Norton Personal Firewall 2005... |
PC World June 21, 2007 Erik Larkin |
Surprise! You May Have More Firewall Than You Need Windows Vista's firewall doesn't come with outbound filtering turned on, but does it matter? |
Macworld May 24, 2006 Jeffery Battersby |
Mac OS X Firewall OS X's built-in firewall is enough for most users |
Macworld May 22, 2006 Jeffery Battersby |
IPNetSentryX Powerful intrusion detector for experts only |
InternetNews December 12, 2005 Jim Wagner |
Angling to Guard Inside Information Security company Oakley takes aim at network leaks that happen behind the firewall, not malicious hackers from the outside. |
PC Magazine October 4, 2006 Neil J. Rubenking |
Norton Internet Security 2007 Symantec's latest version of its all-inclusive protection software, Norton Internet Security 2007, offers top-flight protection without getting in your face. |
InternetNews May 20, 2011 Sean Michael Kerner |
Fedora 15 Linux Gets Dynamic Firewall Tech Linux distro debuts a new type of firewall that enables users and applications to open and close ports on the fly. |
PC Magazine September 23, 2011 Jill Duffy |
A Concise Guide to Android Rooting Why, how, and 'what now?' for rooting an Android phone, plus 7 apps for root users. |
PC Magazine April 18, 2007 Russell Morgan |
Essential Security: Firewalls Businesses, like homes, must be locked up tight to keep out crooks. |
PC World August 2003 Stan Miastkowski |
Step-By-Step: Bulletproof Your PC With a Software Firewall For any computer with an Internet connection, a firewall is essential. Here are the setup basics. |
Macworld May 22, 2006 Jeffery Battersby |
Flying Buttress 1.4 Firewall add-on sports excellent features, less-than-excellent documentation and support |
T.H.E. Journal February 2005 |
Product Watch - Lightspeed Firewall Lightspeed Firewall provides well-integrated, multiple levels of security to create a comprehensive firewall. |
InternetNews March 10, 2006 Sean Michael Kerner |
Marcus Ranum, CSO, Tenable Network Security Firewall inventor Marcus Ranum sounds off on security threats and how open source doesn't necessarily make software better. |