Similar Articles |
|
Linux Journal April 1, 2002 Mick Bauer |
Paranoid Penguin: Hardening Sendmail The author examines sendmail's security controversies and builds an SMTP gateway for handling internet mail... |
Linux Journal December 1, 2006 George Belotsky |
A Server (Almost) of Your Own A virtual private server gives you root access without the high cost of a dedicated server. Here is how to set up e-mail on a VPS. |
RootPrompt.org April 24, 2000 Lance Spitzner |
Preparing Your Box For the Internet The basics of securing a Linux box. The examples provided here are based on Red Hat 6.0, but should apply to most Linux distributions. |
Linux Journal October 2000 Mick Bauer & Brenno de Winter |
Using Postfix for Secure SMTP Gateways Improve your site's e-mail hygiene and make life difficult for spammers and hackers. |
Unix Insider August 2000 Mo Budlong |
Using cron basics Cron allows you to program jobs to be performed at specific times or at steady intervals. This month Mo Budlong explains some cron fundamentals and runs an experiment. |
Linux Journal September 30, 2006 Dave Jones |
Building and Integrating a Small Office Intranet Here are valuable tips for building an intranet that integrates enterprise services in a user-friendly way. |
Linux Journal March 2000 Jeff Regan |
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. |
PC Magazine March 2, 2004 Davis D. Janowski |
Small-Business Security For cash-strapped, IT-barren companies, all-in-one security appliances offer affordable protection. Here's how to make one work for your network. |
Linux Journal March 2000 Tristan Greaves |
Network Monitoring with Linux Are you having trouble keeping your network under control? Here is an introduction to NOCOL: the freeware network monitoring system which will help you keep instability at bay. |
Linux Journal December 2000 Michael O'Brien |
A Linux-Based Automatic Backup System A step-by-step procedure for establishing a backup system that will save time and money. |
PC World September 2001 Sean Captain |
Stealth Fighters Today's best antivirus programs are tough on PC parasites but easy on users... |
PC Magazine February 2, 2005 Gottesman & Karagiannis |
A False Sense of Security Only 85 percent of the AOL/NCSA survey respondents were running antivirus software. Worse, while 71 percent of those people thought they were updating their protection at least weekly (including automatic updates), barely half of them actually were. |
Unix Insider September 2000 Mo Budlong |
Traveling down the Unix $PATH Why do some commands need a dot-slash in order to run? In this month's Unix 101 column, Mo Budlong explores the answer to this question, and explains the difference between built-in and executable commands. |
PC Magazine October 5, 2004 Sheryl Canter |
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. |
Information Today February 2001 Marshall Breeding |
A Prescription for Computer Health We finished the year with little to no damage to our computer systems. Read on to learn more about how to develop a successful strategy for computing in an increasingly dangerous world... |
PC Magazine August 19, 2003 Sheryl Canter |
Effective Immunity Viruses keep spreading, and PCs keep getting infected. What can you do to stay secure? |
PC World December 2000 Kim Zetter |
Computer Viruses: The Next Generation What will be the next virulent outbreak? No one knows, except that it's guaranteed to be more lethal than ever... |
PC World October 13, 2000 Kim Zetter |
How It Works: Viruses They're the "common cold" for computers; we'll show you how they operate and how to protect your PC... |
Linux Journal April 1, 2007 Mick Bauer |
Paranoid Penguin - Linux Firewalls for Everyone Need a personal firewall, an enterprise Internet gateway or something in between? iptables does it all! |
AskMen.com September 20, 2000 Justin Becker |
How To: Optimize Your Computer Defragmenting, Keep it on, Screen saver, Firewall, Clear your cache, Scan disk, etc. |
PC Magazine July 13, 2004 Alexandra Robbins |
The Virus Wars As the problem continues to escalate, the future direction of the virus wars is something of an unknown, because it depends on so many variables, including the shifting motivations for virus writing. |
RootPrompt.org August 14, 2000 |
Building A Secure Webserver The writers of this article are going to configure a machine that will be placed outside their firewall to act as a web server for their organization. In it they detail what they plan to do to make their server as secure as they can while still satisfying their business requirements. |
BusinessWeek March 22, 2004 Stephen H. Wildstrom |
Toughing Out The Junk-Mail Virus An insidious strain swipes e-addresses from your PC -- to spam your friends |
Unix Insider January 2001 Sandra Henry-Stocker |
Understanding viruses What exactly is a virus, how does it work, and how can you protect your system from one? The author explains the difference between viruses and worms, and why keeping up with and preventing them is so difficult... |
PC Magazine February 15, 2006 Matthew D. Sarrel |
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. |
T.H.E. Journal April 2004 Judith Rajala |
Computer Virus Protection Simply having virus protection software on your institution's computer system doesn't guarantee safety and security. Instead, protection and prevention is a team effort between the users and the anti-virus software. Includes a list of useful websites. |
RootPrompt.org April 10, 2000 Lance Spitzner |
Auditing Your Firewall How to Audit Your Firewall Setup. |
AskMen.com August 1, 2001 Justin Becker |
Keep Your Computer Virus-Free Call the doctor and head for the hospital: you've just been infected by a computer virus that's erasing your entire hard drive, as you speak. It's time to protect yourself before this happens, and take the necessary steps to make your computer virus-free... |
PC World November 15, 2000 Kim Zetter |
What Makes Johnny (and Jane) Write Viruses? Forget the stereotypes--virus writers range in age and outlook, but many share an undeveloped sense of ethics, researcher finds... |
PC World December 2003 Scott Spanbauer |
Ultimate Network Security: How to Install a Firewall Everything you need to know about selecting and installing a firewall for your PC or network. |
New Architect July 2002 Paul Sholtz |
Directory Integration Using directory services to successfully manage partner relationships |
Knowledge@Wharton September 10, 2003 |
System Alert: You've Got... Worms Was the recent spate of attacks just more of the same -- or are virus writers beginning to infect computers with other gains in mind? Experts at Wharton and elsewhere weigh in on possible motives and defenses against them. |
PC World November 2003 Andrew Brandt |
Privacy Watch: Make Sure Your Firewall Is Sturdy Test your firewall to find out if it has any holes -- and then plug them up. |
Home Toys October 2002 Craig Chadwick |
Television Control Interface for Handicapped Users This article provides an example of how the HomeVision home automation controller might be used by a handicapped individual. |
PC World March 11, 2001 |
Top 5 Firewall Utilities Protect your PC from suspicious activity on your network or the Internet... |