Similar Articles |
|
RootPrompt.org June 7, 2000 Lance Spitzner |
Know Your Enemy: A Forensic Analysis A study of an attack on a system. Instead of focusing on the tools and tactics used, he focuses on how he learned what happened and pieced the information together. The purpose is to give you the forensic skills necessary to analyze and learn the threats your organization faces... |
RootPrompt.org September 11, 2000 |
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... |
Unix Insider October 2000 Sandra Henry-Stocker |
Square one Security experts recommend turning off all network services you don't need in order to guard against possible attacks. But how do you know which services you don't need -- and which ones you do? A helpful breakdown of services that are safe to disable... |
Linux Journal December 1, 2002 Mick Bauer |
Configuring and Using an FTP Proxy How to add a layer of security between the bad guys and your public FTP servers. |
Linux Journal March 2000 Jeff Regan |
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. |
Linux Journal January 2001 Mick Bauer |
The 101 Uses of OpenSSH: Part I This article covers ssh's background and architecture, how to build and/or install OpenSSH, how to use ssh as an encrypted replacement for Telnet, how to set some basic ssh configuration options and how to use scp for encrypted file transfers... |
RootPrompt.org September 7, 2000 Sander Plomp |
Amateur Fortress Building in Linux Part 1 Sander Plomp is tired of articles telling you to edit inetd.conf. So he wrote this article that looks at how to turn your system into amateur fortress in some interesting ways. |
Linux Journal December 1, 2006 George Belotsky |
A Server (Almost) of Your Own A virtual private server gives you root access without the high cost of a dedicated server. Here is how to set up e-mail on a VPS. |
Linux Journal December 22, 2001 Jeremy D. Impson |
VNC, Securely: Part 2 Secure, transparent and ubiquitous desktops with VNC and OpenSSH... |
Linux Journal November 29, 2001 Eric Jorn Seneca |
sendmail: Introduction and Configuration A guide for those of you configuring your first e-mail server... |
Linux Journal July 2000 |
Best of Technical Support Configuring ipchains; PPP Networking; Recovery after Partitioning; Removing Another OS; Film and Video; Permission to Change; Missing Host Key?; Sender Not Receiving; SCSI and Mounting CD-ROMs |
Linux Journal March 2000 Tristan Greaves |
Network Monitoring with Linux Are you having trouble keeping your network under control? Here is an introduction to NOCOL: the freeware network monitoring system which will help you keep instability at bay. |
RootPrompt.org June 26, 2000 Lance E. Spitzner |
Knowing When Someone Is Knocking Lance E. Spitzner tells us how you can protect yourself by detecting intrusion attempts and then covers what you can do about them. |
RootPrompt.org March 13, 2000 Lance Spitzner |
Know Your Enemy: III In the third part of this three part series Lance Spitzner tells us about what happens once a Script Kiddie gains root. Specifically, how they cover their tracks and what they do next.... |
Linux Journal August 25, 2004 Christian Herzog |
Building a Diskless 2.6 Firewall For your next DIY project, pick up an old Pentium computer and a CompactFlash card and build a custom router/firewall using Linux. |
Linux Journal September 2001 David A. Bandel |
Taming the Wild Netfilter Need to upgrade the moat on your castle? Here's how to use Netfilter and ipchains to increase security on home systems... |
RootPrompt.org July 5, 2000 |
The Motives and Psychology of Black-hats Inside the compromise of a Solaris 2.6 system and the ensuing conversations within the black-hat community |
Linux Journal September 1, 2007 Jeramiah Bowling |
Fedora Directory Server: the Evolution of Linux Authentication FDS seems evolutionary, not revolutionary. It does not change the way in which LDAP operates at a fundamental level. What it does do is take the complex task of administering LDAP and makes it easier while extending normally commercial features. |
Linux Journal December 1, 2006 Paul Sery |
Tighter SSH Security with Two-Factor Authentication How to set up two-factor authentication using a USB pendrive and ssh-agent for root logins. |
Linux Journal April 1, 2002 |
Best of Technical Support RPM Won't Let Me Upgrade... USB Keyboard Stopped Working... SuSE Won't Boot, Red Hat Won't Display... You Can't Log in Now; Get a Life... I Have No DHCP and I Must Network... Opening a File with filep_open... |
PC Magazine August 31, 2005 Kaven & Rupley |
D.I.Y. Linux Here are step-by-step instructions for installing and customizing your own Linux system. |
Linux Journal June 27, 2006 Mark Rais |
Linux Terminal Servers for Any Business How businesses can tap the power of thin clients with Linux Terminal Server (LTS). |
Linux Journal December 1, 2001 Dave Jones |
Building an E-mail Virus Detection System for Your Network The best way to stop the spread of e-mail-based viruses is not to let them into your system. The basic outline of my system consists of using Bash scripts, metamail, grep, the Obtuse Systems' smtpd product, Samba and a command-line virus scanner... |
Linux Journal January 12, 2006 Ryan Mauer |
Xen Virtualization and Linux Clustering, Part 1 Interested in seeing what all the fuss is about Xen? Use the steps in this tutorial to get Xen installed and domains configured. |
RootPrompt.org September 13, 2000 Sander Plomp |
Amateur Fortress Building in Linux Part 2 Of course, deep down there is always some potential for catastrophic security hole - in the TCP stack, the kernel, whatever. That is inevitable. I can live with that. I just don't want it to be a biweekly event... |
RootPrompt.org August 21, 2000 |
Securing Linux Mandrake As Linux Mandrake works its way away from its Red Hat roots, they've added a number of features "out of the box" that make it easier to use as a server. However, there are still a number of things that I do before considering a new install "ready" to be configured for offering any services. |
Linux Journal August 2000 Stew Benedict |
Yellow Dog Linux on the iMac A guide to installing and running YDL on a PowerPC. |
Linux Journal December 1, 2006 Lyle Frost |
Thinking Thin Connecting thin clients to Linux. |
Linux Journal October 1, 2002 |
Best of Tech Support Help for upgrading SCSI disks, dual booting with Slackware and Linux home routers. |
RootPrompt.org July 19, 2000 Tyler |
My experience with being cracked Tyler sent in this story about his experience getting cracked. In it he tells us what should not happen after you find you've been cracked. |
RootPrompt.org March 25, 2002 |
Linux Install / Reinstall Philosophy I've had a lot of practice installing slackware linux recently. As a result, I've worked out a new install philosophy... |
Linux Journal June 2000 |
Best of Technical Support Route 675... Li Lo, Sweet Linux... Can't Get No Resolution... Driving Miss Printer... You've Got Mail |
Linux Journal June 2000 Michael J. Hammel |
Installing Window Maker Mr. Hammel gives us the basics for installing and configuring Window Maker. |
Linux Journal November 29, 2005 Duncan Napier |
Build a Home Terabyte Backup System Using Linux Build a low-cost, terabyte-sized backup server using Linux and back up your digital audio files, digital images and digital movie recordings. |
Linux Journal May 2000 |
Best of Technical Support Lost Linux root password... Problems with sis6215 chip... ``modem busy''... Problems with 2nd CD-ROM drive... Printing... mgetty with modem... etc. |
Linux Journal April 2000 Michael J. Hammel |
Enlightenment Basics A guide to getting and installing the Enlightenment window manager. |
Linux Journal September 2000 |
Best of Technical Support Making an image of a floppy... Printing web fonts... Sharing files with Windows on a dual-boot box... Starting PostgreSQL on boot... Boot problems with a monitor... Getting a cable modem to work... Failure to connect to ISP... Configuration questions... |
Linux Journal October 2000 |
Best of Technical Support Dependencies and Libraries... One Working Parallel Port... Booting Problem... Function Keys Not Working... Cannot Access C: Drive... |
Linux Journal February 1, 2007 Steven Mathes |
The Interoperability Power of Linux-NTFS Tools Some of the best Windows utilities available might be in your Linux partition. |
Linux Journal August 2000 Denny Fox |
Product Review After watching the wireless networking developments for quite a while, I have finally found an affordable wireless solution that works with Linux. |
Linux Journal December 1, 2006 Mick Bauer |
Paranoid Penguin - Running Network Services under User-Mode Linux, Part II Our objective is to use User-Mode Linux to create one or more virtual guest machines, each running a different network service. That way, if one application on one guest machine gets compromised somehow, others won't be affected. |
Linux Journal December 2000 Michael O'Brien |
A Linux-Based Automatic Backup System A step-by-step procedure for establishing a backup system that will save time and money. |
Linux Journal March 2001 Ian Spare |
Deploying the Squid proxy server on Linux Ian gives an example of the installation, configuration and maintenance of this multi-tentacled invertebrate Proxy Server... |
Linux Journal January 1, 2003 Adam Lazur |
Power Sessions with Screen Screen is a terminal multiplexer that allows you to manage many processes through one physical terminal. Each process gets its own virtual window, and you can bounce between virtual windows interacting with each process. |
Linux Journal April 1, 2002 Mick Bauer |
Paranoid Penguin: Hardening Sendmail The author examines sendmail's security controversies and builds an SMTP gateway for handling internet mail... |
Linux Journal September 2001 Don Marti |
Review: SuSE Linux 7.2 Professional If you're going to install your first Linux server or take on the task of deploying Linux on the desktop, you could do a lot worse than SuSE 7.2 Professional. Key features include a journaling filesystem, a crypto filesystem, an easy-to-use desktop environment and network updates... |
Linux Journal September 30, 2006 Albert Martorell |
SMART (Smart Monitoring and Rebooting Tool) If you want an agent to monitor and control services, you'll need to get SMART. It's wonderful having a colleague who is checking that everything works correctly 24/7 and who informs you about troubles after they already have been solved. |
Linux Journal November 2001 |
Best of Technical Support Mounting Mac OS Partitions on YellowDog 2.0... Firewall Takes Hours to Start... Printing Stopped Working... How to Change Samba Passwords... How to Start a Web Server Automatically... I Have No Phone and I Must Connect... Adding a Hard Drive... etc. |
Linux Journal January 1, 2002 Duncan Napier |
Setting up a VPN Gateway How to install and run an IPSec-based VPN gateway with a firewall using a single bootable Linux diskette distribution... |
RootPrompt.org August 16, 2000 |
Review of Storm Linux 2000 I found this to be a well thought out and executed distribution. It is the closest thing to a kids and mom installation that I have used. I would recommend it to anyone installing Linux for the first time or someone looking for an installation for their newbie friends. |