Similar Articles |
|
RootPrompt.org May 29, 2000 Reto Haeni |
Can IPv6 replace SSL? A brief overview of the features of IPv6 and its security specifications. In the later sections of the paper, he compares the security specifications of IPv6 to one of today's available security protocols, SSL (Secure Sockets Layer). |
Linux Journal November 1, 2003 Robert Love |
The New Work Queue Interface in the 2.6 Kernel This article deals with the new work queue interface only, which was introduced during the 2.5 development series to replace the ailing keventd part of the task queue interface. |
RootPrompt.org August 30, 2000 |
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. |
Linux Journal February 1, 2004 Brad Hards |
A Guided Tour of Ethereal Learn exactly what's in all those packets flying by on your network with this essential development and administration tool. |
RootPrompt.org May 7, 2001 |
Testing a Router or Firewall We do not present a generic high level method. Indeed, every network administrator has its own way to set up a device or to solve a problem. We emphasize on the low level method by presenting key points, which can be linked together in order to construct the method of every person... |
Linux Journal March 2, 2007 Michael Rash |
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. |
RootPrompt.org June 14, 2000 |
The Secrets of Snoop Lance Spitzner tell us about the secrets of Snoop: A passive approach to your network security. |
Linux Journal May 2000 P. T. Breuer, A. Marin Lopez & Arturo Garcia Ares |
The Network Block Device A network block device (NBD) driver makes a remote resource look like a local device in Linux, allowing a cheap and safe real-time mirror to be constructed. |
Unix Insider March 2001 Jim Mauro |
Solaris sockets, past and present A close look at kernel sockets in Solaris... |
Linux Journal September 2001 David A. Bandel |
Taming the Wild Netfilter Need to upgrade the moat on your castle? Here's how to use Netfilter and ipchains to increase security on home systems... |
Linux Journal April 1, 2007 Dinil Divakaran |
Starting a Linux Firewall from Scratch Here are the basic steps involved in developing a firewall from scratch, using tools in Linux. |
Linux Journal April 2000 Preston F. Crow |
The Linux Home Network Everything you need to know to make those Internet and intranet connections at home. |
Linux Journal April 1, 2007 Matthew Gast |
Time-Zone Processing with Asterisk, Part II Asterisk provides an extensive toolkit for designing PBX-hosted services. This article explains how to track your time zone as you travel, and handle your calls based on whether or not they arrive during your daylight hours. |
Linux Journal March 1, 2007 Sean Walberg |
Expose VoIP Problems Using Wireshark Sniff out VoIP problems with Wireshark, an open-source network protocol analyzer. VoIP involves a complex set of protocols that Wireshark can decode and relate to each other. |
Unix Insider February 2001 Jim Mauro |
Understanding the Solaris socket filesystem The first in a two-part series about how sockets are implemented in Solaris. I'll cover the evolution of the socket filesystem and sockfs, and detail how the new implementation addresses some of the compatibility issues that existed with the previous version... |
Military & Aerospace Electronics July 2006 Steve Rood Goldman |
Military Gigabit Ethernet: a TOE-to-TOE Comparison Ethernet's widespread use and longevity has resulted in an abundance of COTS hardware and network application software for military use. Fast Ethernet has been deployed for years and now Gigabit Ethernet is being designed into system upgrades and new weapon systems. |
Linux Journal May 1, 2007 Michael Rash |
Protecting SSH Servers with Single Packet Authorization Lock down access to SSH with Single Packet Authorization. With this setup on a Linux system, no one will be able to tell that SSHD is even listening under an nmap scan, and only authenticated and authorized clients will be able to communicate with SSHD. |
Linux Journal April 2001 Ibrahim Haddad & Makan Pourzandi |
Linux on Carrier Grade Web Servers The Linux Virtual Server provides a software-based solution for web site traffic distribution across multiple computers. |
RootPrompt.org September 11, 2000 |
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... |
JavaWorld November 2001 Bishop & Warren |
Jini-like discovery for RMI Not yet on the Jini bandwagon? Despite its powerful mechanisms, Jini has yet to be accepted in mainstream Java development. Until that happens, developers need to find better Remote Method Invocation (RMI) solutions. This article walks you through a Jini-like discovery mechanism for your RMI development. |
IEEE Spectrum February 2010 Lubacz et al. |
Vice Over IP: The VoIP Steganography Threat A growing cadre of criminals is hiding secret messages in voice data. |
InternetNews January 17, 2006 Sean Michael Kerner |
New Linux Kernel Patched There is a new point release Linux kernel that comes barely two weeks after 2.6.15 was released and fixes at least three different vulnerabilities. |
RootPrompt.org May 1, 2000 Lance Spitzner |
IDing remote hosts, without them knowing IDing remote hosts, without them knowing using Passive Fingerprinting. |
PC Magazine December 22, 2004 Konstantinos Karagiannis |
Sniffing out Secrets Whether you're interacting with someone in real time through an insecure protocol like instant messaging or sending sensitive information in an e-mail, your data can pass the virtual noses of many Ethernet interfaces. And some of those noses are sniffing. |
PC Magazine July 1, 2003 Leon Erlanger |
Ready for IPv6, Part 2 The new Internet Protocol (IP) standard promises to make connections more ubiquitous, efficient, and secure. But how will we implement it? |
Linux Journal March 1, 2007 Sean Walberg |
How to Configure SIP and NAT Can you hear me now? Making VoIP work through a NAT gateway. |
IEEE Spectrum June 2006 Nicolas Boillot |
Beating the Crunch There's no way around it: Internet Protocol version 6 is happening, but the benefits will be slight at first, and patience is required. Besides providing more addresses, IPv6 offers greater security and it has features that improve real-time applications. |
Linux Journal March 2000 Jeff Regan |
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. |
PC Magazine October 5, 2004 Sheryl Canter |
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. |
Home Toys April 2003 John Drabik |
Creating an Effective VPN Implementation on Embedded Linux This article discusses issues and tradeoffs associated with implementation of IPsec on Virtual Private Network (VPN) gateways. |
IEEE Spectrum December 2008 Bob Briscoe |
A Fairer, Faster Internet Protocol TCP -- the way we share bandwidth -- needs a makeover. |
Linux Journal April 1, 2002 Alan Zeichick |
Product Review: SnapGear Lite An Inexpensive Home Office/Small Office Firewall and VPN Client... |
InternetNews September 20, 2006 Sean Michael Kerner |
Pirate Linux Kernel 2.6.18 Hits The 2.6.18 kernel includes a long list of functional updates and improvements. |
PC Magazine February 15, 2006 Matthew D. Sarrel |
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. |
PC Magazine August 19, 2003 Dennis Fisher |
The Lookout: New Breed of Trojan Security researchers believe they have identified a new breed of Trojan horse that is infecting machines on the Internet, possibly in preparation for a larger coordinated attack. |
PC World February 2006 Scott Spanbauer |
Knowledge Is Power: Your Essential Internet Glossary Learn a few key terms to become more Internet savvy |
InternetNews June 19, 2006 Sean Michael Kerner |
Linux Kernel Takes on Niagara New Linux kernel 2.6.17 release adds support for architectures new and old. |
Linux Journal August 1, 2002 Robert Love |
Kernel Locking Techniques The author explains the various locking primitives in the Linux kernel, why you need them and how kernel developers can use them to write safe code. |
InternetNews March 7, 2005 Sean Michael Kerner |
'Land' Bug Back to Bedevil Microsoft Servers Windows Server 2003 and XP SP2 machines without properly configured firewalls are at risk of a Denial of Service attack via the "LAND" bug, according to a security researcher. |
Wired November 2001 Steve Silberman |
Meet the Bellbusters Network-geek power couple Judy Estrin and Bill Carrico helped build the Internet as we know it. Now they want to safeguard its soul... |
Linux Journal May 1, 2002 Pedro Paulo Ferreira Bueno |
Understanding IDS for Linux A discussion of the different types of intrusion detection systems and how to create signatures to identify attacks... |
InternetNews May 25, 2005 |
Cisco Patches DNS, VoIP Flaws Cisco issued a patch for a domain name system vulnerability that could put some of its routers and Voice Over IP products at risk for exploits. |
InternetNews March 20, 2006 Sean Michael Kerner |
Linux 2.6's Sweet Sixteen Linux kernel 2.6.16 is released and includes support for Oracle-clustered file systems and expanded support for the Cell processor. |
Linux Journal September 30, 2006 Mick Bauer |
Running Network Services under User-Mode Linux, Part I Learn to leverage the Linux kernel's virtualization features to isolate network daemons. For example, you could run Apache and BIND as separate guests so that a security hole in one will not leave the other exposed. |
Unix Insider December 2000 Sandra Henry-Stocker |
OS identification When hackers plan to break into Websites, they first try to find out which operating system the site is using. Once they determine that and which services are running, their chances of successfully attacking a system are greatly increased. What can you do to stop them? |
Linux Journal August 2000 Michael A. Schwarz |
Take Command klogd: The Kernel Logging Daemon |
Linux Journal July 1, 2002 Greg Kroah-Hartman |
Proper Linux Kernel Coding Style Some simple rules, written and unwritten, to ensure that other kernel users understand your work. |
InternetNews January 27, 2005 Sean Michael Kerner |
Multiple Flaws Hound Cisco A week after Cisco reported a vulnerability in its Internetwork Operating System (IOS) Software Embedded Call Processing Solutions, the company has, thrice again, been hit. |
ONLINE November 2001 Peter Vanderheyden |
Divide-and-Conquer Patent Research A revolutionary strategy to optimize your time and increase your influence... |
InternetNews March 28, 2006 Sean Michael Kerner |
Linux Kernel Point Release Fixes Flaws A potential vulnerability is quickly plugged as kernel developers issue the first point release of the 2.6.16 kernel. |