MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Linux Journal
April 1, 2002
Mick Bauer
Paranoid Penguin: Hardening Sendmail The author examines sendmail's security controversies and builds an SMTP gateway for handling internet mail... mark for My Articles similar articles
Linux Journal
December 1, 2006
George Belotsky
A Server (Almost) of Your Own A virtual private server gives you root access without the high cost of a dedicated server. Here is how to set up e-mail on a VPS. mark for My Articles similar articles
RootPrompt.org
April 24, 2000
Lance Spitzner
Preparing Your Box For the Internet The basics of securing a Linux box. The examples provided here are based on Red Hat 6.0, but should apply to most Linux distributions. mark for My Articles similar articles
Linux Journal
October 2000
Mick Bauer & Brenno de Winter
Using Postfix for Secure SMTP Gateways Improve your site's e-mail hygiene and make life difficult for spammers and hackers. mark for My Articles similar articles
Unix Insider
August 2000
Mo Budlong
Using cron basics Cron allows you to program jobs to be performed at specific times or at steady intervals. This month Mo Budlong explains some cron fundamentals and runs an experiment. mark for My Articles similar articles
Linux Journal
September 30, 2006
Dave Jones
Building and Integrating a Small Office Intranet Here are valuable tips for building an intranet that integrates enterprise services in a user-friendly way. mark for My Articles similar articles
Linux Journal
March 2000
Jeff Regan
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. mark for My Articles similar articles
PC Magazine
March 2, 2004
Davis D. Janowski
Small-Business Security For cash-strapped, IT-barren companies, all-in-one security appliances offer affordable protection. Here's how to make one work for your network. mark for My Articles similar articles
Linux Journal
March 2000
Tristan Greaves
Network Monitoring with Linux Are you having trouble keeping your network under control? Here is an introduction to NOCOL: the freeware network monitoring system which will help you keep instability at bay. mark for My Articles similar articles
Linux Journal
December 2000
Michael O'Brien
A Linux-Based Automatic Backup System A step-by-step procedure for establishing a backup system that will save time and money. mark for My Articles similar articles
PC World
September 2001
Sean Captain
Stealth Fighters Today's best antivirus programs are tough on PC parasites but easy on users... mark for My Articles similar articles
PC Magazine
February 2, 2005
Gottesman & Karagiannis
A False Sense of Security Only 85 percent of the AOL/NCSA survey respondents were running antivirus software. Worse, while 71 percent of those people thought they were updating their protection at least weekly (including automatic updates), barely half of them actually were. mark for My Articles similar articles
Unix Insider
September 2000
Mo Budlong
Traveling down the Unix $PATH Why do some commands need a dot-slash in order to run? In this month's Unix 101 column, Mo Budlong explores the answer to this question, and explains the difference between built-in and executable commands. mark for My Articles similar articles
PC Magazine
October 5, 2004
Sheryl Canter
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. mark for My Articles similar articles
Information Today
February 2001
Marshall Breeding
A Prescription for Computer Health We finished the year with little to no damage to our computer systems. Read on to learn more about how to develop a successful strategy for computing in an increasingly dangerous world... mark for My Articles similar articles
PC Magazine
August 19, 2003
Sheryl Canter
Effective Immunity Viruses keep spreading, and PCs keep getting infected. What can you do to stay secure? mark for My Articles similar articles
PC World
December 2000
Kim Zetter
Computer Viruses: The Next Generation What will be the next virulent outbreak? No one knows, except that it's guaranteed to be more lethal than ever... mark for My Articles similar articles
PC World
October 13, 2000
Kim Zetter
How It Works: Viruses They're the "common cold" for computers; we'll show you how they operate and how to protect your PC... mark for My Articles similar articles
Linux Journal
April 1, 2007
Mick Bauer
Paranoid Penguin - Linux Firewalls for Everyone Need a personal firewall, an enterprise Internet gateway or something in between? iptables does it all! mark for My Articles similar articles
AskMen.com
September 20, 2000
Justin Becker
How To: Optimize Your Computer Defragmenting, Keep it on, Screen saver, Firewall, Clear your cache, Scan disk, etc. mark for My Articles similar articles
PC Magazine
July 13, 2004
Alexandra Robbins
The Virus Wars As the problem continues to escalate, the future direction of the virus wars is something of an unknown, because it depends on so many variables, including the shifting motivations for virus writing. mark for My Articles similar articles
RootPrompt.org
August 14, 2000
Building A Secure Webserver The writers of this article are going to configure a machine that will be placed outside their firewall to act as a web server for their organization. In it they detail what they plan to do to make their server as secure as they can while still satisfying their business requirements. mark for My Articles similar articles
BusinessWeek
March 22, 2004
Stephen H. Wildstrom
Toughing Out The Junk-Mail Virus An insidious strain swipes e-addresses from your PC -- to spam your friends mark for My Articles similar articles
Unix Insider
January 2001
Sandra Henry-Stocker
Understanding viruses What exactly is a virus, how does it work, and how can you protect your system from one? The author explains the difference between viruses and worms, and why keeping up with and preventing them is so difficult... mark for My Articles similar articles
PC Magazine
February 15, 2006
Matthew D. Sarrel
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. mark for My Articles similar articles
T.H.E. Journal
April 2004
Judith Rajala
Computer Virus Protection Simply having virus protection software on your institution's computer system doesn't guarantee safety and security. Instead, protection and prevention is a team effort between the users and the anti-virus software. Includes a list of useful websites. mark for My Articles similar articles
RootPrompt.org
April 10, 2000
Lance Spitzner
Auditing Your Firewall How to Audit Your Firewall Setup. mark for My Articles similar articles
AskMen.com
August 1, 2001
Justin Becker
Keep Your Computer Virus-Free Call the doctor and head for the hospital: you've just been infected by a computer virus that's erasing your entire hard drive, as you speak. It's time to protect yourself before this happens, and take the necessary steps to make your computer virus-free... mark for My Articles similar articles
PC World
November 15, 2000
Kim Zetter
What Makes Johnny (and Jane) Write Viruses? Forget the stereotypes--virus writers range in age and outlook, but many share an undeveloped sense of ethics, researcher finds... mark for My Articles similar articles
PC World
December 2003
Scott Spanbauer
Ultimate Network Security: How to Install a Firewall Everything you need to know about selecting and installing a firewall for your PC or network. mark for My Articles similar articles
New Architect
July 2002
Paul Sholtz
Directory Integration Using directory services to successfully manage partner relationships mark for My Articles similar articles
Knowledge@Wharton
September 10, 2003
System Alert: You've Got... Worms Was the recent spate of attacks just more of the same -- or are virus writers beginning to infect computers with other gains in mind? Experts at Wharton and elsewhere weigh in on possible motives and defenses against them. mark for My Articles similar articles
PC World
November 2003
Andrew Brandt
Privacy Watch: Make Sure Your Firewall Is Sturdy Test your firewall to find out if it has any holes -- and then plug them up. mark for My Articles similar articles
Home Toys
October 2002
Craig Chadwick
Television Control Interface for Handicapped Users This article provides an example of how the HomeVision home automation controller might be used by a handicapped individual. mark for My Articles similar articles
PC World
March 11, 2001
Top 5 Firewall Utilities Protect your PC from suspicious activity on your network or the Internet... mark for My Articles similar articles