MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Linux Journal
January 2001
Mick Bauer
The 101 Uses of OpenSSH: Part I This article covers ssh's background and architecture, how to build and/or install OpenSSH, how to use ssh as an encrypted replacement for Telnet, how to set some basic ssh configuration options and how to use scp for encrypted file transfers... mark for My Articles similar articles
Linux Journal
December 22, 2001
Jeremy D. Impson
VNC, Securely: Part 2 Secure, transparent and ubiquitous desktops with VNC and OpenSSH... mark for My Articles similar articles
Linux Journal
December 1, 2006
Paul Sery
Tighter SSH Security with Two-Factor Authentication How to set up two-factor authentication using a USB pendrive and ssh-agent for root logins. mark for My Articles similar articles
PC Magazine
January 18, 2006
Anil Hemrajani
Free Access to Your PC from Anywhere VNC (Virtual Network Computing) lets you control a Windows, Linux, or Apple machine from any Internet-connected system. mark for My Articles similar articles
PC Magazine
August 17, 2004
Ellison & Caven
Unleash Your Printer Reviews of six wireless print servers for the home and small office, and two for business use. Hawking HWPS12UG... Axis OfficeBasic USB... Belkin F1UP001... etc. mark for My Articles similar articles
Linux Journal
April 1, 2007
Girish Venkatachalam
The OpenSSH Protocol under the Hood The nitty-gritty details as to what OpenSSH is and why it is ubiquitous. mark for My Articles similar articles
RootPrompt.org
April 24, 2000
Lance Spitzner
Preparing Your Box For the Internet The basics of securing a Linux box. The examples provided here are based on Red Hat 6.0, but should apply to most Linux distributions. mark for My Articles similar articles
PC Magazine
December 1, 2009
M. David Stone
Gaining Network Printer Access It's not unusual for a non-administrator user to find that he or she can't print to a network printer, even though an administrator on the same system can. mark for My Articles similar articles
PC Magazine
August 3, 2004
Network Printers Small to medium-size businesses or home offices with more than one computer have good reason to consider sharing a printer over a network. mark for My Articles similar articles
InternetNews
September 22, 2005
Sean Michael Kerner
SSH Hardens the Secure Shell The originator of the ubiquitous SSH protocol rolls out new solutions for enterprise file transfers. The company says its new version is enterprise grade, and that the open source version is not. mark for My Articles similar articles
Linux Journal
July 2000
Best of Technical Support Configuring ipchains; PPP Networking; Recovery after Partitioning; Removing Another OS; Film and Video; Permission to Change; Missing Host Key?; Sender Not Receiving; SCSI and Mounting CD-ROMs mark for My Articles similar articles
T.H.E. Journal
September 2000
Special Section - Notebooks Gateway Solo 1150... Acer TravelMate 520 series... iBook from Macintosh... Dell Latitude CPt S... mark for My Articles similar articles
AskMen.com
January 26, 2001
Gregory Cartier
A Lesson In Port Wine Almost out of nowhere, Port wine has emerged as an alternative to wine and cocktails at luncheons, after-work outings and home get-togethers... mark for My Articles similar articles
RootPrompt.org
April 3, 2000
Fernando Schapachnik
Defeating DDOS II A proposal for defeating Distributed Denial of Service Attacks based on changing network routes... mark for My Articles similar articles
PC Magazine
April 4, 2008
Loyd Case
A New Network for the Printer? Set up your wireless network for access to your printer. mark for My Articles similar articles
PC Magazine
February 14, 2007
Share A Wired Printer? Sharing a printer between two systems is easier with wi-fi networking. mark for My Articles similar articles
Linux Journal
March 2, 2007
Michael Rash
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. mark for My Articles similar articles
InternetNews
August 30, 2004
Ryan Naraine
Cisco Confirms DoS Flaws Cisco's IOS-powered devices at risk of Denial of Service attacks. mark for My Articles similar articles
Macworld
October 25, 2005
Andrew T. Laurence
Timbuktu Pro 8.5 Worthy upgrade stresses security and encryption of network connections and has better Tiger compatibility. mark for My Articles similar articles
Linux Journal
January 2, 2002
Jose Nazario
A Rough Year for SSH In 2001, ssh was found to have several security flaws and has improved thanks to its trials... mark for My Articles similar articles
Linux Journal
October 2001
Charles Curley
Review: Microlite BackupEDGE Version 01.01.08 BackupEDGE from Microlite is an excellent backup product. It has a flexible command-line and menu interface, will back up over networks and can be used for disaster recovery. Documentation is extensive and readily available. It is a proprietary product, priced competitively... mark for My Articles similar articles
New Architect
March 2003
Brian Wilson
Quest Spotlight on Web Servers 3 How can you gather meaningful statistics on remote systems without installing agent software? By using tools that are already installed. Spotlight can make use of existing FTP, SSH, telnet, rexec, and Windows file-share protocols. Unfortunately, this means potentially opening up security holes. mark for My Articles similar articles
Unix Insider
November 2000
Sandra Henry-Stocker
Tapping on the walls Paring down your network services isn't the only way to protect your systems against attacks: port scanning can also be an effective tool. Here's how to stay one step ahead of your enemy... mark for My Articles similar articles
Linux Journal
January 1, 2007
Andrew De Ponte
An Automated Reliable Backup Solution Creating an unattended, encrypted, redundant, network backup solution using Linux, Duplicity and COTS hardware. mark for My Articles similar articles
CIO
November 19, 2010
David F. Carr
Five Things CIOs Need to Know About Mobile Printing As mobile devices become more capable, travelling executives are looking to be able to print from them. Finding a solution can be complicated, but there are possible workarounds. mark for My Articles similar articles
PC World
October 2002
Scott Dunn
Windows Tips: Quick and Easy Ways to Master Windows Printing Print faster and smarter by tweaking Windows' printer settings; get more control over the Windows print queue. mark for My Articles similar articles
PC Magazine
December 20, 2006
Should I "Stealth" This Port? The open port 443 on a router is used to access secure websites, so keep it available. mark for My Articles similar articles