Similar Articles |
|
Linux Journal January 1, 2002 Jeremy Impson |
VNC, Transparently By the end of this two-part series, you'll have a configuration that allows users to log in to their X-Window desktop via a display manager. The user will have secure access to the same desktop in the same state from the workstation console and anywhere else on a network. |
PC Magazine January 18, 2006 Anil Hemrajani |
Free Access to Your PC from Anywhere VNC (Virtual Network Computing) lets you control a Windows, Linux, or Apple machine from any Internet-connected system. |
Linux Journal January 2001 Mick Bauer |
The 101 Uses of OpenSSH: Part I This article covers ssh's background and architecture, how to build and/or install OpenSSH, how to use ssh as an encrypted replacement for Telnet, how to set some basic ssh configuration options and how to use scp for encrypted file transfers... |
RootPrompt.org April 24, 2000 Lance Spitzner |
Preparing Your Box For the Internet The basics of securing a Linux box. The examples provided here are based on Red Hat 6.0, but should apply to most Linux distributions. |
Linux Journal April 1, 2007 Girish Venkatachalam |
The OpenSSH Protocol under the Hood The nitty-gritty details as to what OpenSSH is and why it is ubiquitous. |
Linux Journal December 1, 2006 Paul Sery |
Tighter SSH Security with Two-Factor Authentication How to set up two-factor authentication using a USB pendrive and ssh-agent for root logins. |
Linux Journal February 1, 2002 Rory Krause |
Using ssh Port Forwarding to Print at Remote Locations This article shows you how to connect the printing systems on different networks across the Internet in a secure manner... |
RootPrompt.org September 11, 2000 |
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... |
Linux Journal December 1, 2006 Lyle Frost |
Thinking Thin Connecting thin clients to Linux. |
Linux Journal January 2, 2002 Jose Nazario |
A Rough Year for SSH In 2001, ssh was found to have several security flaws and has improved thanks to its trials... |
Linux Journal September 2001 David A. Bandel |
Taming the Wild Netfilter Need to upgrade the moat on your castle? Here's how to use Netfilter and ipchains to increase security on home systems... |
Linux Journal December 1, 2006 George Belotsky |
A Server (Almost) of Your Own A virtual private server gives you root access without the high cost of a dedicated server. Here is how to set up e-mail on a VPS. |
Linux Journal April 1, 2007 Dinil Divakaran |
Starting a Linux Firewall from Scratch Here are the basic steps involved in developing a firewall from scratch, using tools in Linux. |
InternetNews September 22, 2005 Sean Michael Kerner |
SSH Hardens the Secure Shell The originator of the ubiquitous SSH protocol rolls out new solutions for enterprise file transfers. The company says its new version is enterprise grade, and that the open source version is not. |
Linux Journal July 2000 |
Best of Technical Support Configuring ipchains; PPP Networking; Recovery after Partitioning; Removing Another OS; Film and Video; Permission to Change; Missing Host Key?; Sender Not Receiving; SCSI and Mounting CD-ROMs |
Macworld October 25, 2005 Andrew T. Laurence |
Timbuktu Pro 8.5 Worthy upgrade stresses security and encryption of network connections and has better Tiger compatibility. |
PC Magazine April 6, 2005 David A. Karp |
Control a PC for Free With a remote control solution, you sit in front of one computer and view the desktop of another computer in a window. |
Linux Journal June 1, 2002 David A. Bandel |
Kernel Korner: A NATural Progression A look at network address translation and how to avoid common errors when constructing iptables rules... |
PC World July 2004 Scott Dunn |
Access Your Desktop From Wherever You May Be Use XP's Remote Desktop or free, downloadable VNC software from RealVNC to access your system from a distance. |
RootPrompt.org August 21, 2000 |
Securing Linux Mandrake As Linux Mandrake works its way away from its Red Hat roots, they've added a number of features "out of the box" that make it easier to use as a server. However, there are still a number of things that I do before considering a new install "ready" to be configured for offering any services. |
Linux Journal April 1, 2007 Mick Bauer |
Paranoid Penguin - Linux Firewalls for Everyone Need a personal firewall, an enterprise Internet gateway or something in between? iptables does it all! |
Linux Journal January 1, 2007 Andrew De Ponte |
An Automated Reliable Backup Solution Creating an unattended, encrypted, redundant, network backup solution using Linux, Duplicity and COTS hardware. |
New Architect March 2003 Brian Wilson |
Quest Spotlight on Web Servers 3 How can you gather meaningful statistics on remote systems without installing agent software? By using tools that are already installed. Spotlight can make use of existing FTP, SSH, telnet, rexec, and Windows file-share protocols. Unfortunately, this means potentially opening up security holes. |
Linux Journal October 2001 Charles Curley |
Review: Microlite BackupEDGE Version 01.01.08 BackupEDGE from Microlite is an excellent backup product. It has a flexible command-line and menu interface, will back up over networks and can be used for disaster recovery. Documentation is extensive and readily available. It is a proprietary product, priced competitively... |
PC Magazine October 7, 2009 Mario Morejon |
Mac OS X Server Snow Leopard Mac OS X Server Snow Leopard delivers exactly what you expect: a great user interface. But it fails in select areas of organization and performance. |
JavaWorld July 2002 |
Remote-control Java These days, running a graphic terminal and controlling a computer remotely on the other side of the planet is common---which is why Microsoft decided to build remote control into Windows XP. This article shows you how to easily export your user interface over the network to a remote computer with the popular Virtual Network Computing (VNC) protocol and a small, free library. |
Linux Journal September 1, 2007 |
Letters Readers sound off: And Now for Something Completely Different... BSD Script Modification... Recognize This... etc. |
Popular Mechanics July 2009 Seth Porges |
How to Use Your iMac as a Second Screen You can put an iMac to work as an external monitor for another computer with a program called ScreenRecycler. |
RootPrompt.org March 25, 2002 |
Linux Install / Reinstall Philosophy I've had a lot of practice installing slackware linux recently. As a result, I've worked out a new install philosophy... |