Similar Articles |
|
Linux Journal January 2001 Mick Bauer |
The 101 Uses of OpenSSH: Part I This article covers ssh's background and architecture, how to build and/or install OpenSSH, how to use ssh as an encrypted replacement for Telnet, how to set some basic ssh configuration options and how to use scp for encrypted file transfers... |
Linux Journal December 22, 2001 Jeremy D. Impson |
VNC, Securely: Part 2 Secure, transparent and ubiquitous desktops with VNC and OpenSSH... |
Linux Journal December 1, 2006 Paul Sery |
Tighter SSH Security with Two-Factor Authentication How to set up two-factor authentication using a USB pendrive and ssh-agent for root logins. |
PC Magazine January 18, 2006 Anil Hemrajani |
Free Access to Your PC from Anywhere VNC (Virtual Network Computing) lets you control a Windows, Linux, or Apple machine from any Internet-connected system. |
PC Magazine August 17, 2004 Ellison & Caven |
Unleash Your Printer Reviews of six wireless print servers for the home and small office, and two for business use. Hawking HWPS12UG... Axis OfficeBasic USB... Belkin F1UP001... etc. |
Linux Journal April 1, 2007 Girish Venkatachalam |
The OpenSSH Protocol under the Hood The nitty-gritty details as to what OpenSSH is and why it is ubiquitous. |
RootPrompt.org April 24, 2000 Lance Spitzner |
Preparing Your Box For the Internet The basics of securing a Linux box. The examples provided here are based on Red Hat 6.0, but should apply to most Linux distributions. |
PC Magazine December 1, 2009 M. David Stone |
Gaining Network Printer Access It's not unusual for a non-administrator user to find that he or she can't print to a network printer, even though an administrator on the same system can. |
PC Magazine August 3, 2004 |
Network Printers Small to medium-size businesses or home offices with more than one computer have good reason to consider sharing a printer over a network. |
InternetNews September 22, 2005 Sean Michael Kerner |
SSH Hardens the Secure Shell The originator of the ubiquitous SSH protocol rolls out new solutions for enterprise file transfers. The company says its new version is enterprise grade, and that the open source version is not. |
Linux Journal July 2000 |
Best of Technical Support Configuring ipchains; PPP Networking; Recovery after Partitioning; Removing Another OS; Film and Video; Permission to Change; Missing Host Key?; Sender Not Receiving; SCSI and Mounting CD-ROMs |
T.H.E. Journal September 2000 |
Special Section - Notebooks Gateway Solo 1150... Acer TravelMate 520 series... iBook from Macintosh... Dell Latitude CPt S... |
AskMen.com January 26, 2001 Gregory Cartier |
A Lesson In Port Wine Almost out of nowhere, Port wine has emerged as an alternative to wine and cocktails at luncheons, after-work outings and home get-togethers... |
RootPrompt.org April 3, 2000 Fernando Schapachnik |
Defeating DDOS II A proposal for defeating Distributed Denial of Service Attacks based on changing network routes... |
PC Magazine April 4, 2008 Loyd Case |
A New Network for the Printer? Set up your wireless network for access to your printer. |
PC Magazine February 14, 2007 |
Share A Wired Printer? Sharing a printer between two systems is easier with wi-fi networking. |
Linux Journal March 2, 2007 Michael Rash |
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. |
InternetNews August 30, 2004 Ryan Naraine |
Cisco Confirms DoS Flaws Cisco's IOS-powered devices at risk of Denial of Service attacks. |
Macworld October 25, 2005 Andrew T. Laurence |
Timbuktu Pro 8.5 Worthy upgrade stresses security and encryption of network connections and has better Tiger compatibility. |
Linux Journal January 2, 2002 Jose Nazario |
A Rough Year for SSH In 2001, ssh was found to have several security flaws and has improved thanks to its trials... |
Linux Journal October 2001 Charles Curley |
Review: Microlite BackupEDGE Version 01.01.08 BackupEDGE from Microlite is an excellent backup product. It has a flexible command-line and menu interface, will back up over networks and can be used for disaster recovery. Documentation is extensive and readily available. It is a proprietary product, priced competitively... |
New Architect March 2003 Brian Wilson |
Quest Spotlight on Web Servers 3 How can you gather meaningful statistics on remote systems without installing agent software? By using tools that are already installed. Spotlight can make use of existing FTP, SSH, telnet, rexec, and Windows file-share protocols. Unfortunately, this means potentially opening up security holes. |
Unix Insider November 2000 Sandra Henry-Stocker |
Tapping on the walls Paring down your network services isn't the only way to protect your systems against attacks: port scanning can also be an effective tool. Here's how to stay one step ahead of your enemy... |
Linux Journal January 1, 2007 Andrew De Ponte |
An Automated Reliable Backup Solution Creating an unattended, encrypted, redundant, network backup solution using Linux, Duplicity and COTS hardware. |
CIO November 19, 2010 David F. Carr |
Five Things CIOs Need to Know About Mobile Printing As mobile devices become more capable, travelling executives are looking to be able to print from them. Finding a solution can be complicated, but there are possible workarounds. |
PC World October 2002 Scott Dunn |
Windows Tips: Quick and Easy Ways to Master Windows Printing Print faster and smarter by tweaking Windows' printer settings; get more control over the Windows print queue. |
PC Magazine December 20, 2006 |
Should I "Stealth" This Port? The open port 443 on a router is used to access secure websites, so keep it available. |