MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
RootPrompt.org
April 24, 2000
Lance Spitzner
Preparing Your Box For the Internet The basics of securing a Linux box. The examples provided here are based on Red Hat 6.0, but should apply to most Linux distributions. mark for My Articles similar articles
Linux Journal
September 2001
David A. Bandel
Taming the Wild Netfilter Need to upgrade the moat on your castle? Here's how to use Netfilter and ipchains to increase security on home systems... mark for My Articles similar articles
Linux Journal
March 2000
Jeff Regan
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. mark for My Articles similar articles
Linux Journal
April 1, 2007
Mick Bauer
Paranoid Penguin - Linux Firewalls for Everyone Need a personal firewall, an enterprise Internet gateway or something in between? iptables does it all! mark for My Articles similar articles
RootPrompt.org
September 7, 2000
Sander Plomp
Amateur Fortress Building in Linux Part 1 Sander Plomp is tired of articles telling you to edit inetd.conf. So he wrote this article that looks at how to turn your system into amateur fortress in some interesting ways. mark for My Articles similar articles
Linux Journal
April 1, 2007
Dinil Divakaran
Starting a Linux Firewall from Scratch Here are the basic steps involved in developing a firewall from scratch, using tools in Linux. mark for My Articles similar articles
RootPrompt.org
August 30, 2000
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. mark for My Articles similar articles
Unix Insider
October 2000
Sandra Henry-Stocker
Square one Security experts recommend turning off all network services you don't need in order to guard against possible attacks. But how do you know which services you don't need -- and which ones you do? A helpful breakdown of services that are safe to disable... mark for My Articles similar articles
RootPrompt.org
June 7, 2000
Lance Spitzner
Know Your Enemy: A Forensic Analysis A study of an attack on a system. Instead of focusing on the tools and tactics used, he focuses on how he learned what happened and pieced the information together. The purpose is to give you the forensic skills necessary to analyze and learn the threats your organization faces... mark for My Articles similar articles
Linux Journal
June 1, 2002
David A. Bandel
Kernel Korner: A NATural Progression A look at network address translation and how to avoid common errors when constructing iptables rules... mark for My Articles similar articles
Linux Journal
March 2001
Ian Spare
Deploying the Squid proxy server on Linux Ian gives an example of the installation, configuration and maintenance of this multi-tentacled invertebrate Proxy Server... mark for My Articles similar articles
RootPrompt.org
August 14, 2000
Building A Secure Webserver The writers of this article are going to configure a machine that will be placed outside their firewall to act as a web server for their organization. In it they detail what they plan to do to make their server as secure as they can while still satisfying their business requirements. mark for My Articles similar articles
Linux Journal
May 1, 2000
Jacek Artymiak
Python Programming for Beginners If you want to outsmart the Spanish Inquisition, learn Python. This article is a practical introduction to writing non-trivial applications in Python. mark for My Articles similar articles
JavaWorld
April 4, 2003
Jean-Pierre Norguet
Java FTP client libraries reviewed This article explains how to write FTP client code in Java using available libraries. It compares an exhaustive list of FTP libraries, presents pros and cons of each library, and helps decision makers choose the most appropriate one for their needs. mark for My Articles similar articles
Linux Journal
December 2000
Michael O'Brien
A Linux-Based Automatic Backup System A step-by-step procedure for establishing a backup system that will save time and money. mark for My Articles similar articles
PC Magazine
October 5, 2004
Sheryl Canter
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. mark for My Articles similar articles
Linux Journal
September 1, 2007
Tech Tips Combine Automount with FUSE and CurlFtpFs... Easy Installation of NVIDIA and ATI Drivers on Ubuntu/Kubuntu... etc. mark for My Articles similar articles
PC World
July 19, 2007
Scott Spanbauer
Upload the FTP Utility That Bill Gave You Windows' own address bar lets you transfer files to your ISP's Web server. mark for My Articles similar articles
Linux Journal
September 2001
Don Marti
Review: SuSE Linux 7.2 Professional If you're going to install your first Linux server or take on the task of deploying Linux on the desktop, you could do a lot worse than SuSE 7.2 Professional. Key features include a journaling filesystem, a crypto filesystem, an easy-to-use desktop environment and network updates... mark for My Articles similar articles
PC Magazine
November 2, 2004
Sheryl Canter
No-Cost Ad Blocking You can block distracting, privacy-invading Web site ads with tools that come with your computer—no need to buy a thing. mark for My Articles similar articles
Linux Journal
July 2001
Best of Technical Support Tar over rsh... Error in Loading Shared Libraries... What is the meaning of the .2 and .3 at the end of the filename?... Mandrake without X... How Can I Set the FTP Welcome Message?... Wiping a Hard Drive MBR... etc. mark for My Articles similar articles
Macworld
July 8, 2005
Joe Kissell
FTP client software Updates of Transmit, Fetch, and Captain FTP offer easier, more flexible file transfers, and many Tiger-specific interface enhancements. mark for My Articles similar articles
Macworld
September 2003
Jason Teague
FTP Clients Seven OS X programs help you push your files around the Internet mark for My Articles similar articles
Linux Journal
July 2000
Harvey Friedman
Book Review: Linux Administration: A Beginner's Guide by Steve Shah. Although it does have ``beginner'' in the title, this is not a book for someone entirely new to computers. Rather, it was written for one who might have prior experience as systems administrator for another computer system, and is finally ready to try Linux. mark for My Articles similar articles
CAUSE/EFFECT
Vol 22 Num 2 1999
Mark Sheehan and Allen Porter
Authenticated Off-Net Access to Commercial Library Resources When an institution licenses data from a provider for use by its memembers, how can it ensure that only its own members can access the data while also being flexible enough to allow them to access the data when they are off site? mark for My Articles similar articles
Linux Journal
September 2000
Jason Schumaker
Product Review: Axis 2100 Network Camera Axis Communications sent Linux Journal one of their 2100 network cameras for review. I was lucky enough to spend a week playing with the thing, and I am very impressed. mark for My Articles similar articles
PC Magazine
December 22, 2004
Oliver Kaven
Host Your Own Photo Site Need a way to manage and share all your digital images? Here's a solution. mark for My Articles similar articles
New Architect
March 2003
Brian Wilson
Quest Spotlight on Web Servers 3 How can you gather meaningful statistics on remote systems without installing agent software? By using tools that are already installed. Spotlight can make use of existing FTP, SSH, telnet, rexec, and Windows file-share protocols. Unfortunately, this means potentially opening up security holes. mark for My Articles similar articles
JavaWorld
February 2002
Luke Taylor
Customized EJB security in JBoss The current Enterprise JavaBeans specification supports basic declarative, role-based access-control mechanisms, but provides limited support for coding application-specific security checks. Moreover, it doesn't define any way to factor out access-control code from business logic, or to integrate external authorization services. The open source, J2EE-compliant JBoss application server features a protection-proxy security architecture that will help you overcome these restrictions. mark for My Articles similar articles
CIO
September 15, 2002
Christopher Lindquist
Danger from Within Just when you thought that network security couldn't get any tougher, Moscow-based iNetPrivacy Software has released AntiFirewall. INetPrivacy claims the utility is for users who value their privacy and freedom of communication, but IT departments may want to be on the lookout for the tool. mark for My Articles similar articles
Macworld
October 31, 2006
Jeffery Battersby
Interarchy 8.2 The program's new look may at first throw Interarchy 7 users a curve, but the new interface significantly enhances what is already a first-class FTP application. mark for My Articles similar articles
PC Magazine
February 15, 2006
Matthew D. Sarrel
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. mark for My Articles similar articles
Macworld
November 2004
Andrew Laurence
Interarchy 7.2 If you need only basic FTP abilities, Interarchy 7.2 is probably overkill. If your needs include encryption, Web transfers, automation, and network monitoring, Interarchy rolls together an impressive array of tools at an attractive price. mark for My Articles similar articles
Linux Journal
April 2001
Don Marti
Focus: Internet/Intranet Three key problems face Linux as an Internet platform today: security, proprietary software and the high cost of popularity. mark for My Articles similar articles
PC World
July 2002
Lincoln Spector
Move Your Net Files Faster WS_FTP Pro great for heavy-duty file transfers. mark for My Articles similar articles
Macworld
May 2001
Mel Beckman
Norton Personal Firewall 1.0 Internet-protection software for individual users needs beefing up... mark for My Articles similar articles
JavaWorld
May 9, 2003
Frank Sommers
Jini Starter Kit 2.0 tightens Jini's security framework Security for distributed systems based on mobile Java code is the theme of Sun Microsystems' new Jini Starter Kit, JSK 2.0. This article introduces JSK 2.0's security-related features. mark for My Articles similar articles
InternetNews
June 24, 2004
Dan Muse
A New Era for FTP Software? Will FTP software be the e-mail of the new millennium? Ipswitch, makers of WS_FTP, thinks so and is rolling out a home version as well as a beefed-up professional version to appeal to a broad range of users. mark for My Articles similar articles
Macworld
May 2001
Steve Schwartz
Aladdin Transporter 1.0 Utility lets you script repetitive file and internet activities... mark for My Articles similar articles
PC Magazine
May 18, 2004
Jay Munro
Sending Large Files What do you do when you need to share a file but it's too big to e-mail? Options include FTP and HTTP, Peer-To-Peer, and utilizing an Internet-hosted "hard drive." mark for My Articles similar articles
InternetNews
April 1, 2011
SMEStorage Brings FTP to Cloud Storage Provider The storage vendor said it is shipping an add-on that supports FTP on more than 15 Storage Clouds. mark for My Articles similar articles
PC World
April 2005
Arin Hailey
Step-By-Step: Give a Site Blog Appeal It's easy to set up and customize a Weblog for your Web site. We walk you through the necessary steps. mark for My Articles similar articles
Macworld
August 2000
Mel Beckman
FTP Client Pro 3.0 File-Transfer Tool Synchronizes Over The Internet mark for My Articles similar articles
JavaWorld
November 2000
Jeremy Blosser
Explore the Dynamic Proxy API In Java 1.3, Sun introduced the Dynamic Proxy API, which can basically mimic any interface. Add that to an abstract data model, and you can conform any loosely typed data to a strongly typed interface. This article discusses some of the Dynamic Proxy API's many benefits... mark for My Articles similar articles
Macworld
December 2003
Yuval Kossovsky
Panther Server Part II A look at the Server Admin tool mark for My Articles similar articles
Linux Journal
May 2000
Harvey Friedman
Book Review LINUX Administration for Dummies by Michael Bellomo mark for My Articles similar articles
InternetNews
April 20, 2004
Sean Michael Kerner
Popular FTP Client Hits 40-Million Mark Ipswitch celebrates WS_FTP, the little file transfer protocol application that could. mark for My Articles similar articles
JavaWorld
July 2001
Tarak Modi
Clean up your wire protocol with SOAP, Part 4 Here's a framework based on the dynamic proxy classes in the Java 2 Platform, Version 1.3. This framework will make creating SOAP clients just as easy and intuitive as creating SOAP services... mark for My Articles similar articles
T.H.E. Journal
September 2004
Vox Proxy If you use PowerPoint, you'll love Right Seat Software's PowerPoint companion software Vox Proxy. mark for My Articles similar articles