Similar Articles |
|
RootPrompt.org April 24, 2000 Lance Spitzner |
Preparing Your Box For the Internet The basics of securing a Linux box. The examples provided here are based on Red Hat 6.0, but should apply to most Linux distributions. |
Linux Journal September 2001 David A. Bandel |
Taming the Wild Netfilter Need to upgrade the moat on your castle? Here's how to use Netfilter and ipchains to increase security on home systems... |
Linux Journal March 2000 Jeff Regan |
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. |
Linux Journal April 1, 2007 Mick Bauer |
Paranoid Penguin - Linux Firewalls for Everyone Need a personal firewall, an enterprise Internet gateway or something in between? iptables does it all! |
RootPrompt.org September 7, 2000 Sander Plomp |
Amateur Fortress Building in Linux Part 1 Sander Plomp is tired of articles telling you to edit inetd.conf. So he wrote this article that looks at how to turn your system into amateur fortress in some interesting ways. |
Linux Journal April 1, 2007 Dinil Divakaran |
Starting a Linux Firewall from Scratch Here are the basic steps involved in developing a firewall from scratch, using tools in Linux. |
RootPrompt.org August 30, 2000 |
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. |
Unix Insider October 2000 Sandra Henry-Stocker |
Square one Security experts recommend turning off all network services you don't need in order to guard against possible attacks. But how do you know which services you don't need -- and which ones you do? A helpful breakdown of services that are safe to disable... |
RootPrompt.org June 7, 2000 Lance Spitzner |
Know Your Enemy: A Forensic Analysis A study of an attack on a system. Instead of focusing on the tools and tactics used, he focuses on how he learned what happened and pieced the information together. The purpose is to give you the forensic skills necessary to analyze and learn the threats your organization faces... |
Linux Journal June 1, 2002 David A. Bandel |
Kernel Korner: A NATural Progression A look at network address translation and how to avoid common errors when constructing iptables rules... |
Linux Journal March 2001 Ian Spare |
Deploying the Squid proxy server on Linux Ian gives an example of the installation, configuration and maintenance of this multi-tentacled invertebrate Proxy Server... |
RootPrompt.org August 14, 2000 |
Building A Secure Webserver The writers of this article are going to configure a machine that will be placed outside their firewall to act as a web server for their organization. In it they detail what they plan to do to make their server as secure as they can while still satisfying their business requirements. |
Linux Journal May 1, 2000 Jacek Artymiak |
Python Programming for Beginners If you want to outsmart the Spanish Inquisition, learn Python. This article is a practical introduction to writing non-trivial applications in Python. |
JavaWorld April 4, 2003 Jean-Pierre Norguet |
Java FTP client libraries reviewed This article explains how to write FTP client code in Java using available libraries. It compares an exhaustive list of FTP libraries, presents pros and cons of each library, and helps decision makers choose the most appropriate one for their needs. |
Linux Journal December 2000 Michael O'Brien |
A Linux-Based Automatic Backup System A step-by-step procedure for establishing a backup system that will save time and money. |
PC Magazine October 5, 2004 Sheryl Canter |
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. |
Linux Journal September 1, 2007 |
Tech Tips Combine Automount with FUSE and CurlFtpFs... Easy Installation of NVIDIA and ATI Drivers on Ubuntu/Kubuntu... etc. |
PC World July 19, 2007 Scott Spanbauer |
Upload the FTP Utility That Bill Gave You Windows' own address bar lets you transfer files to your ISP's Web server. |
Linux Journal September 2001 Don Marti |
Review: SuSE Linux 7.2 Professional If you're going to install your first Linux server or take on the task of deploying Linux on the desktop, you could do a lot worse than SuSE 7.2 Professional. Key features include a journaling filesystem, a crypto filesystem, an easy-to-use desktop environment and network updates... |
PC Magazine November 2, 2004 Sheryl Canter |
No-Cost Ad Blocking You can block distracting, privacy-invading Web site ads with tools that come with your computer—no need to buy a thing. |
Linux Journal July 2001 |
Best of Technical Support Tar over rsh... Error in Loading Shared Libraries... What is the meaning of the .2 and .3 at the end of the filename?... Mandrake without X... How Can I Set the FTP Welcome Message?... Wiping a Hard Drive MBR... etc. |
Macworld July 8, 2005 Joe Kissell |
FTP client software Updates of Transmit, Fetch, and Captain FTP offer easier, more flexible file transfers, and many Tiger-specific interface enhancements. |
Macworld September 2003 Jason Teague |
FTP Clients Seven OS X programs help you push your files around the Internet |
Linux Journal July 2000 Harvey Friedman |
Book Review: Linux Administration: A Beginner's Guide by Steve Shah. Although it does have ``beginner'' in the title, this is not a book for someone entirely new to computers. Rather, it was written for one who might have prior experience as systems administrator for another computer system, and is finally ready to try Linux. |
CAUSE/EFFECT Vol 22 Num 2 1999 Mark Sheehan and Allen Porter |
Authenticated Off-Net Access to Commercial Library Resources When an institution licenses data from a provider for use by its memembers, how can it ensure that only its own members can access the data while also being flexible enough to allow them to access the data when they are off site? |
Linux Journal September 2000 Jason Schumaker |
Product Review: Axis 2100 Network Camera Axis Communications sent Linux Journal one of their 2100 network cameras for review. I was lucky enough to spend a week playing with the thing, and I am very impressed. |
PC Magazine December 22, 2004 Oliver Kaven |
Host Your Own Photo Site Need a way to manage and share all your digital images? Here's a solution. |
New Architect March 2003 Brian Wilson |
Quest Spotlight on Web Servers 3 How can you gather meaningful statistics on remote systems without installing agent software? By using tools that are already installed. Spotlight can make use of existing FTP, SSH, telnet, rexec, and Windows file-share protocols. Unfortunately, this means potentially opening up security holes. |
JavaWorld February 2002 Luke Taylor |
Customized EJB security in JBoss The current Enterprise JavaBeans specification supports basic declarative, role-based access-control mechanisms, but provides limited support for coding application-specific security checks. Moreover, it doesn't define any way to factor out access-control code from business logic, or to integrate external authorization services. The open source, J2EE-compliant JBoss application server features a protection-proxy security architecture that will help you overcome these restrictions. |
CIO September 15, 2002 Christopher Lindquist |
Danger from Within Just when you thought that network security couldn't get any tougher, Moscow-based iNetPrivacy Software has released AntiFirewall. INetPrivacy claims the utility is for users who value their privacy and freedom of communication, but IT departments may want to be on the lookout for the tool. |
Macworld October 31, 2006 Jeffery Battersby |
Interarchy 8.2 The program's new look may at first throw Interarchy 7 users a curve, but the new interface significantly enhances what is already a first-class FTP application. |
PC Magazine February 15, 2006 Matthew D. Sarrel |
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. |
Macworld November 2004 Andrew Laurence |
Interarchy 7.2 If you need only basic FTP abilities, Interarchy 7.2 is probably overkill. If your needs include encryption, Web transfers, automation, and network monitoring, Interarchy rolls together an impressive array of tools at an attractive price. |
Linux Journal April 2001 Don Marti |
Focus: Internet/Intranet Three key problems face Linux as an Internet platform today: security, proprietary software and the high cost of popularity. |
PC World July 2002 Lincoln Spector |
Move Your Net Files Faster WS_FTP Pro great for heavy-duty file transfers. |
Macworld May 2001 Mel Beckman |
Norton Personal Firewall 1.0 Internet-protection software for individual users needs beefing up... |
JavaWorld May 9, 2003 Frank Sommers |
Jini Starter Kit 2.0 tightens Jini's security framework Security for distributed systems based on mobile Java code is the theme of Sun Microsystems' new Jini Starter Kit, JSK 2.0. This article introduces JSK 2.0's security-related features. |
InternetNews June 24, 2004 Dan Muse |
A New Era for FTP Software? Will FTP software be the e-mail of the new millennium? Ipswitch, makers of WS_FTP, thinks so and is rolling out a home version as well as a beefed-up professional version to appeal to a broad range of users. |
Macworld May 2001 Steve Schwartz |
Aladdin Transporter 1.0 Utility lets you script repetitive file and internet activities... |
PC Magazine May 18, 2004 Jay Munro |
Sending Large Files What do you do when you need to share a file but it's too big to e-mail? Options include FTP and HTTP, Peer-To-Peer, and utilizing an Internet-hosted "hard drive." |
InternetNews April 1, 2011 |
SMEStorage Brings FTP to Cloud Storage Provider The storage vendor said it is shipping an add-on that supports FTP on more than 15 Storage Clouds. |
PC World April 2005 Arin Hailey |
Step-By-Step: Give a Site Blog Appeal It's easy to set up and customize a Weblog for your Web site. We walk you through the necessary steps. |
Macworld August 2000 Mel Beckman |
FTP Client Pro 3.0 File-Transfer Tool Synchronizes Over The Internet |
JavaWorld November 2000 Jeremy Blosser |
Explore the Dynamic Proxy API In Java 1.3, Sun introduced the Dynamic Proxy API, which can basically mimic any interface. Add that to an abstract data model, and you can conform any loosely typed data to a strongly typed interface. This article discusses some of the Dynamic Proxy API's many benefits... |
Macworld December 2003 Yuval Kossovsky |
Panther Server Part II A look at the Server Admin tool |
Linux Journal May 2000 Harvey Friedman |
Book Review LINUX Administration for Dummies by Michael Bellomo |
InternetNews April 20, 2004 Sean Michael Kerner |
Popular FTP Client Hits 40-Million Mark Ipswitch celebrates WS_FTP, the little file transfer protocol application that could. |
JavaWorld July 2001 Tarak Modi |
Clean up your wire protocol with SOAP, Part 4 Here's a framework based on the dynamic proxy classes in the Java 2 Platform, Version 1.3. This framework will make creating SOAP clients just as easy and intuitive as creating SOAP services... |
T.H.E. Journal September 2004 |
Vox Proxy If you use PowerPoint, you'll love Right Seat Software's PowerPoint companion software Vox Proxy. |