MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
RootPrompt.org
May 29, 2000
Reto Haeni
Can IPv6 replace SSL? A brief overview of the features of IPv6 and its security specifications. In the later sections of the paper, he compares the security specifications of IPv6 to one of today's available security protocols, SSL (Secure Sockets Layer). mark for My Articles similar articles
Linux Journal
November 1, 2003
Robert Love
The New Work Queue Interface in the 2.6 Kernel This article deals with the new work queue interface only, which was introduced during the 2.5 development series to replace the ailing keventd part of the task queue interface. mark for My Articles similar articles
RootPrompt.org
August 30, 2000
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. mark for My Articles similar articles
Linux Journal
February 1, 2004
Brad Hards
A Guided Tour of Ethereal Learn exactly what's in all those packets flying by on your network with this essential development and administration tool. mark for My Articles similar articles
RootPrompt.org
May 7, 2001
Testing a Router or Firewall We do not present a generic high level method. Indeed, every network administrator has its own way to set up a device or to solve a problem. We emphasize on the low level method by presenting key points, which can be linked together in order to construct the method of every person... mark for My Articles similar articles
Linux Journal
March 2, 2007
Michael Rash
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. mark for My Articles similar articles
RootPrompt.org
June 14, 2000
The Secrets of Snoop Lance Spitzner tell us about the secrets of Snoop: A passive approach to your network security. mark for My Articles similar articles
Linux Journal
May 2000
P. T. Breuer, A. Marin Lopez & Arturo Garcia Ares
The Network Block Device A network block device (NBD) driver makes a remote resource look like a local device in Linux, allowing a cheap and safe real-time mirror to be constructed. mark for My Articles similar articles
Unix Insider
March 2001
Jim Mauro
Solaris sockets, past and present A close look at kernel sockets in Solaris... mark for My Articles similar articles
Linux Journal
September 2001
David A. Bandel
Taming the Wild Netfilter Need to upgrade the moat on your castle? Here's how to use Netfilter and ipchains to increase security on home systems... mark for My Articles similar articles
Linux Journal
April 1, 2007
Dinil Divakaran
Starting a Linux Firewall from Scratch Here are the basic steps involved in developing a firewall from scratch, using tools in Linux. mark for My Articles similar articles
Linux Journal
April 2000
Preston F. Crow
The Linux Home Network Everything you need to know to make those Internet and intranet connections at home. mark for My Articles similar articles
Linux Journal
April 1, 2007
Matthew Gast
Time-Zone Processing with Asterisk, Part II Asterisk provides an extensive toolkit for designing PBX-hosted services. This article explains how to track your time zone as you travel, and handle your calls based on whether or not they arrive during your daylight hours. mark for My Articles similar articles
Linux Journal
March 1, 2007
Sean Walberg
Expose VoIP Problems Using Wireshark Sniff out VoIP problems with Wireshark, an open-source network protocol analyzer. VoIP involves a complex set of protocols that Wireshark can decode and relate to each other. mark for My Articles similar articles
Unix Insider
February 2001
Jim Mauro
Understanding the Solaris socket filesystem The first in a two-part series about how sockets are implemented in Solaris. I'll cover the evolution of the socket filesystem and sockfs, and detail how the new implementation addresses some of the compatibility issues that existed with the previous version... mark for My Articles similar articles
Military & Aerospace Electronics
July 2006
Steve Rood Goldman
Military Gigabit Ethernet: a TOE-to-TOE Comparison Ethernet's widespread use and longevity has resulted in an abundance of COTS hardware and network application software for military use. Fast Ethernet has been deployed for years and now Gigabit Ethernet is being designed into system upgrades and new weapon systems. mark for My Articles similar articles
Linux Journal
May 1, 2007
Michael Rash
Protecting SSH Servers with Single Packet Authorization Lock down access to SSH with Single Packet Authorization. With this setup on a Linux system, no one will be able to tell that SSHD is even listening under an nmap scan, and only authenticated and authorized clients will be able to communicate with SSHD. mark for My Articles similar articles
Linux Journal
April 2001
Ibrahim Haddad & Makan Pourzandi
Linux on Carrier Grade Web Servers The Linux Virtual Server provides a software-based solution for web site traffic distribution across multiple computers. mark for My Articles similar articles
RootPrompt.org
September 11, 2000
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... mark for My Articles similar articles
JavaWorld
November 2001
Bishop & Warren
Jini-like discovery for RMI Not yet on the Jini bandwagon? Despite its powerful mechanisms, Jini has yet to be accepted in mainstream Java development. Until that happens, developers need to find better Remote Method Invocation (RMI) solutions. This article walks you through a Jini-like discovery mechanism for your RMI development. mark for My Articles similar articles
IEEE Spectrum
February 2010
Lubacz et al.
Vice Over IP: The VoIP Steganography Threat A growing cadre of criminals is hiding secret messages in voice data. mark for My Articles similar articles
InternetNews
January 17, 2006
Sean Michael Kerner
New Linux Kernel Patched There is a new point release Linux kernel that comes barely two weeks after 2.6.15 was released and fixes at least three different vulnerabilities. mark for My Articles similar articles
RootPrompt.org
May 1, 2000
Lance Spitzner
IDing remote hosts, without them knowing IDing remote hosts, without them knowing using Passive Fingerprinting. mark for My Articles similar articles
PC Magazine
December 22, 2004
Konstantinos Karagiannis
Sniffing out Secrets Whether you're interacting with someone in real time through an insecure protocol like instant messaging or sending sensitive information in an e-mail, your data can pass the virtual noses of many Ethernet interfaces. And some of those noses are sniffing. mark for My Articles similar articles
PC Magazine
July 1, 2003
Leon Erlanger
Ready for IPv6, Part 2 The new Internet Protocol (IP) standard promises to make connections more ubiquitous, efficient, and secure. But how will we implement it? mark for My Articles similar articles
Linux Journal
March 1, 2007
Sean Walberg
How to Configure SIP and NAT Can you hear me now? Making VoIP work through a NAT gateway. mark for My Articles similar articles
IEEE Spectrum
June 2006
Nicolas Boillot
Beating the Crunch There's no way around it: Internet Protocol version 6 is happening, but the benefits will be slight at first, and patience is required. Besides providing more addresses, IPv6 offers greater security and it has features that improve real-time applications. mark for My Articles similar articles
Linux Journal
March 2000
Jeff Regan
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. mark for My Articles similar articles
PC Magazine
October 5, 2004
Sheryl Canter
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. mark for My Articles similar articles
Home Toys
April 2003
John Drabik
Creating an Effective VPN Implementation on Embedded Linux This article discusses issues and tradeoffs associated with implementation of IPsec on Virtual Private Network (VPN) gateways. mark for My Articles similar articles
IEEE Spectrum
December 2008
Bob Briscoe
A Fairer, Faster Internet Protocol TCP -- the way we share bandwidth -- needs a makeover. mark for My Articles similar articles
Linux Journal
April 1, 2002
Alan Zeichick
Product Review: SnapGear Lite An Inexpensive Home Office/Small Office Firewall and VPN Client... mark for My Articles similar articles
InternetNews
September 20, 2006
Sean Michael Kerner
Pirate Linux Kernel 2.6.18 Hits The 2.6.18 kernel includes a long list of functional updates and improvements. mark for My Articles similar articles
PC Magazine
February 15, 2006
Matthew D. Sarrel
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. mark for My Articles similar articles
PC Magazine
August 19, 2003
Dennis Fisher
The Lookout: New Breed of Trojan Security researchers believe they have identified a new breed of Trojan horse that is infecting machines on the Internet, possibly in preparation for a larger coordinated attack. mark for My Articles similar articles
PC World
February 2006
Scott Spanbauer
Knowledge Is Power: Your Essential Internet Glossary Learn a few key terms to become more Internet savvy mark for My Articles similar articles
InternetNews
June 19, 2006
Sean Michael Kerner
Linux Kernel Takes on Niagara New Linux kernel 2.6.17 release adds support for architectures new and old. mark for My Articles similar articles
Linux Journal
August 1, 2002
Robert Love
Kernel Locking Techniques The author explains the various locking primitives in the Linux kernel, why you need them and how kernel developers can use them to write safe code. mark for My Articles similar articles
InternetNews
March 7, 2005
Sean Michael Kerner
'Land' Bug Back to Bedevil Microsoft Servers Windows Server 2003 and XP SP2 machines without properly configured firewalls are at risk of a Denial of Service attack via the "LAND" bug, according to a security researcher. mark for My Articles similar articles
Wired
November 2001
Steve Silberman
Meet the Bellbusters Network-geek power couple Judy Estrin and Bill Carrico helped build the Internet as we know it. Now they want to safeguard its soul... mark for My Articles similar articles
Linux Journal
May 1, 2002
Pedro Paulo Ferreira Bueno
Understanding IDS for Linux A discussion of the different types of intrusion detection systems and how to create signatures to identify attacks... mark for My Articles similar articles
InternetNews
May 25, 2005
Cisco Patches DNS, VoIP Flaws Cisco issued a patch for a domain name system vulnerability that could put some of its routers and Voice Over IP products at risk for exploits. mark for My Articles similar articles
InternetNews
March 20, 2006
Sean Michael Kerner
Linux 2.6's Sweet Sixteen Linux kernel 2.6.16 is released and includes support for Oracle-clustered file systems and expanded support for the Cell processor. mark for My Articles similar articles
Linux Journal
September 30, 2006
Mick Bauer
Running Network Services under User-Mode Linux, Part I Learn to leverage the Linux kernel's virtualization features to isolate network daemons. For example, you could run Apache and BIND as separate guests so that a security hole in one will not leave the other exposed. mark for My Articles similar articles
Unix Insider
December 2000
Sandra Henry-Stocker
OS identification When hackers plan to break into Websites, they first try to find out which operating system the site is using. Once they determine that and which services are running, their chances of successfully attacking a system are greatly increased. What can you do to stop them? mark for My Articles similar articles
Linux Journal
August 2000
Michael A. Schwarz
Take Command klogd: The Kernel Logging Daemon mark for My Articles similar articles
Linux Journal
July 1, 2002
Greg Kroah-Hartman
Proper Linux Kernel Coding Style Some simple rules, written and unwritten, to ensure that other kernel users understand your work. mark for My Articles similar articles
InternetNews
January 27, 2005
Sean Michael Kerner
Multiple Flaws Hound Cisco A week after Cisco reported a vulnerability in its Internetwork Operating System (IOS) Software Embedded Call Processing Solutions, the company has, thrice again, been hit. mark for My Articles similar articles
ONLINE
November 2001
Peter Vanderheyden
Divide-and-Conquer Patent Research A revolutionary strategy to optimize your time and increase your influence... mark for My Articles similar articles
InternetNews
March 28, 2006
Sean Michael Kerner
Linux Kernel Point Release Fixes Flaws A potential vulnerability is quickly plugged as kernel developers issue the first point release of the 2.6.16 kernel. mark for My Articles similar articles