Similar Articles |
|
RootPrompt.org June 7, 2000 Lance Spitzner |
Know Your Enemy: A Forensic Analysis A study of an attack on a system. Instead of focusing on the tools and tactics used, he focuses on how he learned what happened and pieced the information together. The purpose is to give you the forensic skills necessary to analyze and learn the threats your organization faces... |
RootPrompt.org July 5, 2000 |
The Motives and Psychology of Black-hats Inside the compromise of a Solaris 2.6 system and the ensuing conversations within the black-hat community |
RootPrompt.org April 24, 2000 Lance Spitzner |
Preparing Your Box For the Internet The basics of securing a Linux box. The examples provided here are based on Red Hat 6.0, but should apply to most Linux distributions. |
Linux Journal August 25, 2004 Christian Herzog |
Building a Diskless 2.6 Firewall For your next DIY project, pick up an old Pentium computer and a CompactFlash card and build a custom router/firewall using Linux. |
RootPrompt.org June 26, 2000 Lance E. Spitzner |
Knowing When Someone Is Knocking Lance E. Spitzner tells us how you can protect yourself by detecting intrusion attempts and then covers what you can do about them. |
Linux Journal July 1, 2007 Richard Bullington-McGuire |
Mambo Exploit Blocked by SELinux A real-world case where Security-Enhanced Linux proved its worth. SELinux prevented the attacker from executing the second stage of the attack, possibly preventing a root compromise. |
RootPrompt.org May 31, 2000 Noel |
Cracked! Part 4: The Sniffer Noel continues the story of when some Unix boxes that he helped admin were cracked. This article tells how they found the sniffer that the cracker was running on their network and what they did next.... |
RootPrompt.org July 19, 2000 Tyler |
My experience with being cracked Tyler sent in this story about his experience getting cracked. In it he tells us what should not happen after you find you've been cracked. |
Linux Journal April 2000 Michael J. Hammel |
Enlightenment Basics A guide to getting and installing the Enlightenment window manager. |
Linux Journal June 2000 Michael J. Hammel |
Installing Window Maker Mr. Hammel gives us the basics for installing and configuring Window Maker. |
Linux Journal September 30, 2006 Albert Martorell |
SMART (Smart Monitoring and Rebooting Tool) If you want an agent to monitor and control services, you'll need to get SMART. It's wonderful having a colleague who is checking that everything works correctly 24/7 and who informs you about troubles after they already have been solved. |
Linux Journal January 1, 2007 Gnull & Voyd |
Tech Tips with Gnull and Voyd Modify initrd to Make 3ware RAID the First Serial Device... Use Knoppix to recover after installing a bad kernel... Finding Disk Space and inode Hogs... |
Linux Journal March 2000 Tristan Greaves |
Network Monitoring with Linux Are you having trouble keeping your network under control? Here is an introduction to NOCOL: the freeware network monitoring system which will help you keep instability at bay. |
RootPrompt.org March 25, 2002 |
Linux Install / Reinstall Philosophy I've had a lot of practice installing slackware linux recently. As a result, I've worked out a new install philosophy... |
RootPrompt.org August 7, 2000 |
The Danger of Script Kiddies There has often been a tendency among System Administrators to discount the danger of script kiddies, and this can be a misleading and dangerous thing to do. Script kiddies can have a much greater capability to cause problems then their skills alone would indicate. |
RootPrompt.org May 10, 2000 Noel |
Cracked! Part 2: Watching and Waiting In the second article Noel continues the story of when some Unix boxes that he helped admin were cracked. This article talks about watching the cracker with a sniffer and talking to the the FBI's Computer Crimes Squad.... |
Linux Journal November 29, 2001 Eric Jorn Seneca |
sendmail: Introduction and Configuration A guide for those of you configuring your first e-mail server... |
Linux Journal December 1, 2006 Mick Bauer |
Paranoid Penguin - Running Network Services under User-Mode Linux, Part II Our objective is to use User-Mode Linux to create one or more virtual guest machines, each running a different network service. That way, if one application on one guest machine gets compromised somehow, others won't be affected. |
Linux Journal September 30, 2006 Mick Bauer |
Running Network Services under User-Mode Linux, Part I Learn to leverage the Linux kernel's virtualization features to isolate network daemons. For example, you could run Apache and BIND as separate guests so that a security hole in one will not leave the other exposed. |
Managed Care December 2001 MargaretAnn Cross |
Increased Pressures Change P&T Committee Makeup Formulary committees once were stocked with academics and administrators. Today, primary care physicians, specialists, and retail pharmacists play a bigger role, and tomorrow's membership will be even more diverse... |
InternetNews May 12, 2005 Paul Shread |
Technical Analysis: Indexes Hang On -- Barely The Dow and S&P need to turn up soon; they have pulled back as far as they can without giving up their recent downtrend line breakouts. |
PC Magazine September 16, 2003 Neil J. Rubenking |
Creating File Shortcuts on CD-ROM If I put a picture file in one folder, is there a way to put a pointer or shortcut to it in the other folders? It's easy on a PC, but when I burn a disc, the shortcuts still point to the PC drive where the original file is located. |
InternetNews September 15, 2005 Paul Shread |
Technical Analysis: Nasdaq, S&P Hang On The Nasdaq and S&P barely held on to big support numbers. |
InternetNews August 24, 2005 Paul Shread |
Technical Analysis: Support Gives Way The Dow and S&P are threatening to go into free fall here. |
Registered Rep. January 5, 2010 David A. Geracioti |
Fund Manager Leuthold Says Outlook Good for Stocks--at Least in the First Half of 2010 Good and bad news for the S&P 500 this year, according to this fund manager. |
Linux Journal April 1, 2007 Dinil Divakaran |
Starting a Linux Firewall from Scratch Here are the basic steps involved in developing a firewall from scratch, using tools in Linux. |
InternetNews April 4, 2005 Paul Shread |
Technical Analysis: Stocks Struggle to Find Support It's not pretty, but the Dow and S&P have a chance. |
InternetNews October 6, 2005 Paul Shread |
Technical Analysis: Stocks Threaten Support Thursday's decline broke more major support levels. |
InternetNews January 26, 2005 Paul Shread |
Technical Analysis: Bears Remain in Control The Dow and S&P stall at resistance once again. |
InternetNews May 5, 2005 Paul Shread |
Technical Analysis: Indexes Digest Gains The S&P remains the index to watch. |