MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Linux Journal
January 1, 2002
Jeremy Impson
VNC, Transparently By the end of this two-part series, you'll have a configuration that allows users to log in to their X-Window desktop via a display manager. The user will have secure access to the same desktop in the same state from the workstation console and anywhere else on a network. mark for My Articles similar articles
PC Magazine
January 18, 2006
Anil Hemrajani
Free Access to Your PC from Anywhere VNC (Virtual Network Computing) lets you control a Windows, Linux, or Apple machine from any Internet-connected system. mark for My Articles similar articles
Linux Journal
January 2001
Mick Bauer
The 101 Uses of OpenSSH: Part I This article covers ssh's background and architecture, how to build and/or install OpenSSH, how to use ssh as an encrypted replacement for Telnet, how to set some basic ssh configuration options and how to use scp for encrypted file transfers... mark for My Articles similar articles
RootPrompt.org
April 24, 2000
Lance Spitzner
Preparing Your Box For the Internet The basics of securing a Linux box. The examples provided here are based on Red Hat 6.0, but should apply to most Linux distributions. mark for My Articles similar articles
Linux Journal
April 1, 2007
Girish Venkatachalam
The OpenSSH Protocol under the Hood The nitty-gritty details as to what OpenSSH is and why it is ubiquitous. mark for My Articles similar articles
Linux Journal
December 1, 2006
Paul Sery
Tighter SSH Security with Two-Factor Authentication How to set up two-factor authentication using a USB pendrive and ssh-agent for root logins. mark for My Articles similar articles
Linux Journal
February 1, 2002
Rory Krause
Using ssh Port Forwarding to Print at Remote Locations This article shows you how to connect the printing systems on different networks across the Internet in a secure manner... mark for My Articles similar articles
RootPrompt.org
September 11, 2000
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... mark for My Articles similar articles
Linux Journal
December 1, 2006
Lyle Frost
Thinking Thin Connecting thin clients to Linux. mark for My Articles similar articles
Linux Journal
January 2, 2002
Jose Nazario
A Rough Year for SSH In 2001, ssh was found to have several security flaws and has improved thanks to its trials... mark for My Articles similar articles
Linux Journal
September 2001
David A. Bandel
Taming the Wild Netfilter Need to upgrade the moat on your castle? Here's how to use Netfilter and ipchains to increase security on home systems... mark for My Articles similar articles
Linux Journal
December 1, 2006
George Belotsky
A Server (Almost) of Your Own A virtual private server gives you root access without the high cost of a dedicated server. Here is how to set up e-mail on a VPS. mark for My Articles similar articles
Linux Journal
April 1, 2007
Dinil Divakaran
Starting a Linux Firewall from Scratch Here are the basic steps involved in developing a firewall from scratch, using tools in Linux. mark for My Articles similar articles
InternetNews
September 22, 2005
Sean Michael Kerner
SSH Hardens the Secure Shell The originator of the ubiquitous SSH protocol rolls out new solutions for enterprise file transfers. The company says its new version is enterprise grade, and that the open source version is not. mark for My Articles similar articles
Linux Journal
July 2000
Best of Technical Support Configuring ipchains; PPP Networking; Recovery after Partitioning; Removing Another OS; Film and Video; Permission to Change; Missing Host Key?; Sender Not Receiving; SCSI and Mounting CD-ROMs mark for My Articles similar articles
Macworld
October 25, 2005
Andrew T. Laurence
Timbuktu Pro 8.5 Worthy upgrade stresses security and encryption of network connections and has better Tiger compatibility. mark for My Articles similar articles
PC Magazine
April 6, 2005
David A. Karp
Control a PC for Free With a remote control solution, you sit in front of one computer and view the desktop of another computer in a window. mark for My Articles similar articles
Linux Journal
June 1, 2002
David A. Bandel
Kernel Korner: A NATural Progression A look at network address translation and how to avoid common errors when constructing iptables rules... mark for My Articles similar articles
PC World
July 2004
Scott Dunn
Access Your Desktop From Wherever You May Be Use XP's Remote Desktop or free, downloadable VNC software from RealVNC to access your system from a distance. mark for My Articles similar articles
RootPrompt.org
August 21, 2000
Securing Linux Mandrake As Linux Mandrake works its way away from its Red Hat roots, they've added a number of features "out of the box" that make it easier to use as a server. However, there are still a number of things that I do before considering a new install "ready" to be configured for offering any services. mark for My Articles similar articles
Linux Journal
April 1, 2007
Mick Bauer
Paranoid Penguin - Linux Firewalls for Everyone Need a personal firewall, an enterprise Internet gateway or something in between? iptables does it all! mark for My Articles similar articles
Linux Journal
January 1, 2007
Andrew De Ponte
An Automated Reliable Backup Solution Creating an unattended, encrypted, redundant, network backup solution using Linux, Duplicity and COTS hardware. mark for My Articles similar articles
New Architect
March 2003
Brian Wilson
Quest Spotlight on Web Servers 3 How can you gather meaningful statistics on remote systems without installing agent software? By using tools that are already installed. Spotlight can make use of existing FTP, SSH, telnet, rexec, and Windows file-share protocols. Unfortunately, this means potentially opening up security holes. mark for My Articles similar articles
Linux Journal
October 2001
Charles Curley
Review: Microlite BackupEDGE Version 01.01.08 BackupEDGE from Microlite is an excellent backup product. It has a flexible command-line and menu interface, will back up over networks and can be used for disaster recovery. Documentation is extensive and readily available. It is a proprietary product, priced competitively... mark for My Articles similar articles
PC Magazine
October 7, 2009
Mario Morejon
Mac OS X Server Snow Leopard Mac OS X Server Snow Leopard delivers exactly what you expect: a great user interface. But it fails in select areas of organization and performance. mark for My Articles similar articles
JavaWorld
July 2002
Remote-control Java These days, running a graphic terminal and controlling a computer remotely on the other side of the planet is common---which is why Microsoft decided to build remote control into Windows XP. This article shows you how to easily export your user interface over the network to a remote computer with the popular Virtual Network Computing (VNC) protocol and a small, free library. mark for My Articles similar articles
Linux Journal
September 1, 2007
Letters Readers sound off: And Now for Something Completely Different... BSD Script Modification... Recognize This... etc. mark for My Articles similar articles
Popular Mechanics
July 2009
Seth Porges
How to Use Your iMac as a Second Screen You can put an iMac to work as an external monitor for another computer with a program called ScreenRecycler. mark for My Articles similar articles
RootPrompt.org
March 25, 2002
Linux Install / Reinstall Philosophy I've had a lot of practice installing slackware linux recently. As a result, I've worked out a new install philosophy... mark for My Articles similar articles