MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
RootPrompt.org
June 7, 2000
Lance Spitzner
Know Your Enemy: A Forensic Analysis A study of an attack on a system. Instead of focusing on the tools and tactics used, he focuses on how he learned what happened and pieced the information together. The purpose is to give you the forensic skills necessary to analyze and learn the threats your organization faces... mark for My Articles similar articles
RootPrompt.org
September 11, 2000
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... mark for My Articles similar articles
Unix Insider
October 2000
Sandra Henry-Stocker
Square one Security experts recommend turning off all network services you don't need in order to guard against possible attacks. But how do you know which services you don't need -- and which ones you do? A helpful breakdown of services that are safe to disable... mark for My Articles similar articles
Linux Journal
December 1, 2002
Mick Bauer
Configuring and Using an FTP Proxy How to add a layer of security between the bad guys and your public FTP servers. mark for My Articles similar articles
Linux Journal
March 2000
Jeff Regan
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. mark for My Articles similar articles
Linux Journal
January 2001
Mick Bauer
The 101 Uses of OpenSSH: Part I This article covers ssh's background and architecture, how to build and/or install OpenSSH, how to use ssh as an encrypted replacement for Telnet, how to set some basic ssh configuration options and how to use scp for encrypted file transfers... mark for My Articles similar articles
RootPrompt.org
September 7, 2000
Sander Plomp
Amateur Fortress Building in Linux Part 1 Sander Plomp is tired of articles telling you to edit inetd.conf. So he wrote this article that looks at how to turn your system into amateur fortress in some interesting ways. mark for My Articles similar articles
Linux Journal
December 1, 2006
George Belotsky
A Server (Almost) of Your Own A virtual private server gives you root access without the high cost of a dedicated server. Here is how to set up e-mail on a VPS. mark for My Articles similar articles
Linux Journal
December 22, 2001
Jeremy D. Impson
VNC, Securely: Part 2 Secure, transparent and ubiquitous desktops with VNC and OpenSSH... mark for My Articles similar articles
Linux Journal
November 29, 2001
Eric Jorn Seneca
sendmail: Introduction and Configuration A guide for those of you configuring your first e-mail server... mark for My Articles similar articles
Linux Journal
July 2000
Best of Technical Support Configuring ipchains; PPP Networking; Recovery after Partitioning; Removing Another OS; Film and Video; Permission to Change; Missing Host Key?; Sender Not Receiving; SCSI and Mounting CD-ROMs mark for My Articles similar articles
Linux Journal
March 2000
Tristan Greaves
Network Monitoring with Linux Are you having trouble keeping your network under control? Here is an introduction to NOCOL: the freeware network monitoring system which will help you keep instability at bay. mark for My Articles similar articles
RootPrompt.org
June 26, 2000
Lance E. Spitzner
Knowing When Someone Is Knocking Lance E. Spitzner tells us how you can protect yourself by detecting intrusion attempts and then covers what you can do about them. mark for My Articles similar articles
RootPrompt.org
March 13, 2000
Lance Spitzner
Know Your Enemy: III In the third part of this three part series Lance Spitzner tells us about what happens once a Script Kiddie gains root. Specifically, how they cover their tracks and what they do next.... mark for My Articles similar articles
Linux Journal
August 25, 2004
Christian Herzog
Building a Diskless 2.6 Firewall For your next DIY project, pick up an old Pentium computer and a CompactFlash card and build a custom router/firewall using Linux. mark for My Articles similar articles
Linux Journal
September 2001
David A. Bandel
Taming the Wild Netfilter Need to upgrade the moat on your castle? Here's how to use Netfilter and ipchains to increase security on home systems... mark for My Articles similar articles
RootPrompt.org
July 5, 2000
The Motives and Psychology of Black-hats Inside the compromise of a Solaris 2.6 system and the ensuing conversations within the black-hat community mark for My Articles similar articles
Linux Journal
September 1, 2007
Jeramiah Bowling
Fedora Directory Server: the Evolution of Linux Authentication FDS seems evolutionary, not revolutionary. It does not change the way in which LDAP operates at a fundamental level. What it does do is take the complex task of administering LDAP and makes it easier while extending normally commercial features. mark for My Articles similar articles
Linux Journal
December 1, 2006
Paul Sery
Tighter SSH Security with Two-Factor Authentication How to set up two-factor authentication using a USB pendrive and ssh-agent for root logins. mark for My Articles similar articles
Linux Journal
April 1, 2002
Best of Technical Support RPM Won't Let Me Upgrade... USB Keyboard Stopped Working... SuSE Won't Boot, Red Hat Won't Display... You Can't Log in Now; Get a Life... I Have No DHCP and I Must Network... Opening a File with filep_open... mark for My Articles similar articles
PC Magazine
August 31, 2005
Kaven & Rupley
D.I.Y. Linux Here are step-by-step instructions for installing and customizing your own Linux system. mark for My Articles similar articles
Linux Journal
June 27, 2006
Mark Rais
Linux Terminal Servers for Any Business How businesses can tap the power of thin clients with Linux Terminal Server (LTS). mark for My Articles similar articles
Linux Journal
December 1, 2001
Dave Jones
Building an E-mail Virus Detection System for Your Network The best way to stop the spread of e-mail-based viruses is not to let them into your system. The basic outline of my system consists of using Bash scripts, metamail, grep, the Obtuse Systems' smtpd product, Samba and a command-line virus scanner... mark for My Articles similar articles
Linux Journal
January 12, 2006
Ryan Mauer
Xen Virtualization and Linux Clustering, Part 1 Interested in seeing what all the fuss is about Xen? Use the steps in this tutorial to get Xen installed and domains configured. mark for My Articles similar articles
RootPrompt.org
September 13, 2000
Sander Plomp
Amateur Fortress Building in Linux Part 2 Of course, deep down there is always some potential for catastrophic security hole - in the TCP stack, the kernel, whatever. That is inevitable. I can live with that. I just don't want it to be a biweekly event... mark for My Articles similar articles
RootPrompt.org
August 21, 2000
Securing Linux Mandrake As Linux Mandrake works its way away from its Red Hat roots, they've added a number of features "out of the box" that make it easier to use as a server. However, there are still a number of things that I do before considering a new install "ready" to be configured for offering any services. mark for My Articles similar articles
Linux Journal
August 2000
Stew Benedict
Yellow Dog Linux on the iMac A guide to installing and running YDL on a PowerPC. mark for My Articles similar articles
Linux Journal
December 1, 2006
Lyle Frost
Thinking Thin Connecting thin clients to Linux. mark for My Articles similar articles
Linux Journal
October 1, 2002
Best of Tech Support Help for upgrading SCSI disks, dual booting with Slackware and Linux home routers. mark for My Articles similar articles
RootPrompt.org
July 19, 2000
Tyler
My experience with being cracked Tyler sent in this story about his experience getting cracked. In it he tells us what should not happen after you find you've been cracked. mark for My Articles similar articles
RootPrompt.org
March 25, 2002
Linux Install / Reinstall Philosophy I've had a lot of practice installing slackware linux recently. As a result, I've worked out a new install philosophy... mark for My Articles similar articles
Linux Journal
June 2000
Best of Technical Support Route 675... Li Lo, Sweet Linux... Can't Get No Resolution... Driving Miss Printer... You've Got Mail mark for My Articles similar articles
Linux Journal
June 2000
Michael J. Hammel
Installing Window Maker Mr. Hammel gives us the basics for installing and configuring Window Maker. mark for My Articles similar articles
Linux Journal
November 29, 2005
Duncan Napier
Build a Home Terabyte Backup System Using Linux Build a low-cost, terabyte-sized backup server using Linux and back up your digital audio files, digital images and digital movie recordings. mark for My Articles similar articles
Linux Journal
May 2000
Best of Technical Support Lost Linux root password... Problems with sis6215 chip... ``modem busy''... Problems with 2nd CD-ROM drive... Printing... mgetty with modem... etc. mark for My Articles similar articles
Linux Journal
April 2000
Michael J. Hammel
Enlightenment Basics A guide to getting and installing the Enlightenment window manager. mark for My Articles similar articles
Linux Journal
September 2000
Best of Technical Support Making an image of a floppy... Printing web fonts... Sharing files with Windows on a dual-boot box... Starting PostgreSQL on boot... Boot problems with a monitor... Getting a cable modem to work... Failure to connect to ISP... Configuration questions... mark for My Articles similar articles
Linux Journal
October 2000
Best of Technical Support Dependencies and Libraries... One Working Parallel Port... Booting Problem... Function Keys Not Working... Cannot Access C: Drive... mark for My Articles similar articles
Linux Journal
February 1, 2007
Steven Mathes
The Interoperability Power of Linux-NTFS Tools Some of the best Windows utilities available might be in your Linux partition. mark for My Articles similar articles
Linux Journal
August 2000
Denny Fox
Product Review After watching the wireless networking developments for quite a while, I have finally found an affordable wireless solution that works with Linux. mark for My Articles similar articles
Linux Journal
December 1, 2006
Mick Bauer
Paranoid Penguin - Running Network Services under User-Mode Linux, Part II Our objective is to use User-Mode Linux to create one or more virtual guest machines, each running a different network service. That way, if one application on one guest machine gets compromised somehow, others won't be affected. mark for My Articles similar articles
Linux Journal
December 2000
Michael O'Brien
A Linux-Based Automatic Backup System A step-by-step procedure for establishing a backup system that will save time and money. mark for My Articles similar articles
Linux Journal
March 2001
Ian Spare
Deploying the Squid proxy server on Linux Ian gives an example of the installation, configuration and maintenance of this multi-tentacled invertebrate Proxy Server... mark for My Articles similar articles
Linux Journal
January 1, 2003
Adam Lazur
Power Sessions with Screen Screen is a terminal multiplexer that allows you to manage many processes through one physical terminal. Each process gets its own virtual window, and you can bounce between virtual windows interacting with each process. mark for My Articles similar articles
Linux Journal
April 1, 2002
Mick Bauer
Paranoid Penguin: Hardening Sendmail The author examines sendmail's security controversies and builds an SMTP gateway for handling internet mail... mark for My Articles similar articles
Linux Journal
September 2001
Don Marti
Review: SuSE Linux 7.2 Professional If you're going to install your first Linux server or take on the task of deploying Linux on the desktop, you could do a lot worse than SuSE 7.2 Professional. Key features include a journaling filesystem, a crypto filesystem, an easy-to-use desktop environment and network updates... mark for My Articles similar articles
Linux Journal
September 30, 2006
Albert Martorell
SMART (Smart Monitoring and Rebooting Tool) If you want an agent to monitor and control services, you'll need to get SMART. It's wonderful having a colleague who is checking that everything works correctly 24/7 and who informs you about troubles after they already have been solved. mark for My Articles similar articles
Linux Journal
November 2001
Best of Technical Support Mounting Mac OS Partitions on YellowDog 2.0... Firewall Takes Hours to Start... Printing Stopped Working... How to Change Samba Passwords... How to Start a Web Server Automatically... I Have No Phone and I Must Connect... Adding a Hard Drive... etc. mark for My Articles similar articles
Linux Journal
January 1, 2002
Duncan Napier
Setting up a VPN Gateway How to install and run an IPSec-based VPN gateway with a firewall using a single bootable Linux diskette distribution... mark for My Articles similar articles
RootPrompt.org
August 16, 2000
Review of Storm Linux 2000 I found this to be a well thought out and executed distribution. It is the closest thing to a kids and mom installation that I have used. I would recommend it to anyone installing Linux for the first time or someone looking for an installation for their newbie friends. mark for My Articles similar articles