MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Linux Journal
May 1, 2002
Pedro Paulo Ferreira Bueno
Understanding IDS for Linux A discussion of the different types of intrusion detection systems and how to create signatures to identify attacks... mark for My Articles similar articles
RootPrompt.org
April 24, 2000
Lance Spitzner
Preparing Your Box For the Internet The basics of securing a Linux box. The examples provided here are based on Red Hat 6.0, but should apply to most Linux distributions. mark for My Articles similar articles
RootPrompt.org
April 10, 2000
Lance Spitzner
Auditing Your Firewall How to Audit Your Firewall Setup. mark for My Articles similar articles
Unix Insider
November 2000
Sandra Henry-Stocker
Tapping on the walls Paring down your network services isn't the only way to protect your systems against attacks: port scanning can also be an effective tool. Here's how to stay one step ahead of your enemy... mark for My Articles similar articles
Unix Insider
October 2000
Sandra Henry-Stocker
Square one Security experts recommend turning off all network services you don't need in order to guard against possible attacks. But how do you know which services you don't need -- and which ones you do? A helpful breakdown of services that are safe to disable... mark for My Articles similar articles
RootPrompt.org
May 17, 2000
Lance Spitzner
Watching Your Logs How to automate the filtering of your logs, freeing up your time while alerting you with the information you need. mark for My Articles similar articles
RootPrompt.org
March 13, 2000
Lance Spitzner
Know Your Enemy: III In the third part of this three part series Lance Spitzner tells us about what happens once a Script Kiddie gains root. Specifically, how they cover their tracks and what they do next.... mark for My Articles similar articles
Linux Journal
October 1, 2002
Mick Bauer
Paranoid Penguin: Stealthful Sniffing, Intrusion Detection and Logging Attackers can't rewrite your log files if they can't connect to the log server. Learn the ways of stealth. mark for My Articles similar articles
RootPrompt.org
June 7, 2000
Lance Spitzner
Know Your Enemy: A Forensic Analysis A study of an attack on a system. Instead of focusing on the tools and tactics used, he focuses on how he learned what happened and pieced the information together. The purpose is to give you the forensic skills necessary to analyze and learn the threats your organization faces... mark for My Articles similar articles
PC World
March 11, 2001
Top 5 Firewall Utilities Protect your PC from suspicious activity on your network or the Internet... mark for My Articles similar articles
RootPrompt.org
September 11, 2000
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... mark for My Articles similar articles
PC Magazine
December 30, 2003
Matthew D. Sarrel
Network Security: Know Your Weaknesses Vulnerability scanners identify your network's insecurities. Which one of these 6 tested products will watch your back? mark for My Articles similar articles
RootPrompt.org
September 7, 2000
Sander Plomp
Amateur Fortress Building in Linux Part 1 Sander Plomp is tired of articles telling you to edit inetd.conf. So he wrote this article that looks at how to turn your system into amateur fortress in some interesting ways. mark for My Articles similar articles
PC Magazine
October 5, 2004
Sheryl Canter
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. mark for My Articles similar articles
PC World
September 1, 2000
Jeff Sengstack
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. mark for My Articles similar articles
RootPrompt.org
June 14, 2000
The Secrets of Snoop Lance Spitzner tell us about the secrets of Snoop: A passive approach to your network security. mark for My Articles similar articles
Unix Insider
December 2000
Sandra Henry-Stocker
OS identification When hackers plan to break into Websites, they first try to find out which operating system the site is using. Once they determine that and which services are running, their chances of successfully attacking a system are greatly increased. What can you do to stop them? mark for My Articles similar articles
Linux Journal
March 2, 2007
Michael Rash
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. mark for My Articles similar articles
PC Magazine
October 28, 2003
Brett Glass
Batten Down Those Ports Don't let malicious intruders find a way into your system. We tell you how they try to sneak in -- and how to keep them out. mark for My Articles similar articles
PC Magazine
August 3, 2004
Keep Your PC Safe Learn to wield your firewall, antivirus, and antispyware tools expertly; don't give up your PC without a fight. mark for My Articles similar articles
PC Magazine
June 22, 2005
Larry Seltzer
Make Your Network Safer by Attacking It A number of excellent tools can help you find out where you're network is vulnerable. mark for My Articles similar articles
Linux Journal
November 29, 2001
Eric Jorn Seneca
sendmail: Introduction and Configuration A guide for those of you configuring your first e-mail server... mark for My Articles similar articles
Linux Journal
March 2000
Jeff Regan
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. mark for My Articles similar articles
PC Magazine
February 2, 2005
Robert P. Lipschutz
Lock Down Your Network When it comes to security, small and midsize businesses (SMBs) often find themselves in an uncomfortable position. They share many of the same security fears that threaten multinational enterprises. mark for My Articles similar articles
PC World
November 2003
Andrew Brandt
Privacy Watch: Make Sure Your Firewall Is Sturdy Test your firewall to find out if it has any holes -- and then plug them up. mark for My Articles similar articles
InternetNews
January 5, 2005
Sean Michael Kerner
Hackers After Patched WINS Servers According to the Internet Storm Center (ISC) at the SANS Institute, hackers are trying to exploit an already patched Microsoft WINS Server vulnerability. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
PC World
May 2005
Lincoln Spector
Hide Your Internet Ports From Snooping Hackers Closing open ports... Turning off Windows new program notification... Printing fonts and saving paper... etc. mark for My Articles similar articles
PC Magazine
August 3, 2005
Ryan Naraine
TCP Port Attack Imminent? An ominous increase in sniffing activity on TCP Port 445 could signal an impending attack targeting a recently patched Microsoft vulnerability. mark for My Articles similar articles
InternetNews
December 9, 2005
Sean Michael Kerner
Do Hackers Look Before They Leap? University of Maryland researchers find that port scanning isn't necessarily a harbinger of an attack. mark for My Articles similar articles
PC World
January 2001
Alan Stafford
Warp Speed Web Access: Sharing the Bandwidth Broadband routers give your network a protected connection to the Internet... mark for My Articles similar articles
New Architect
May 2002
Jay Lyman
to Catch a Thief Effective incident response against network intruders... mark for My Articles similar articles
CIO
September 15, 2002
D.F. Tweney
Who's on Your Network? Intrusion detection systems can work, but they require time and money mark for My Articles similar articles
PC Magazine
December 20, 2006
Should I "Stealth" This Port? The open port 443 on a router is used to access secure websites, so keep it available. mark for My Articles similar articles
PC Magazine
June 23, 2008
Matthew D. Sarrel
How Secure Is Your Company? To protect your business, think like a thief. mark for My Articles similar articles
Linux Journal
August 1, 2007
Tony Kay
AlphaMail Is Scalable and Accessible Web Mail AlphaMail is a high-performance, feature-rich, open-source Web mail system. mark for My Articles similar articles
InternetNews
February 21, 2007
Andy Patrizio
Cisco Issues Security Alert Related to IP Phones Cisco Systems issued an alert on Wednesday that the security of its IP-based phones could be compromised, allowing hackers to get around the security restrictions and change settings or issue a Denial of Service attack. mark for My Articles similar articles
PC Magazine
June 22, 2004
Robert P. Lipschutz
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. mark for My Articles similar articles
OCC Bulletin
May 15, 2000
Infrastructure Threats -- Intrusion Risks This bulletin provides guidance to financial institutions on how to prevent, detect, and respond to intrusions into bank computer systems... mark for My Articles similar articles
PC World
May 2001
Scott Spanbauer
Hunt Down Those Hackers and ... Ignore Them? Uncover possible hackers... customize IE's title bar... install Winamp... mark for My Articles similar articles
PC Magazine
October 1, 2004
Neil J. Rubenking
Personal Firewall--Don't Surf Without It To gauge the effectiveness of two popular firewall packages, we took the gloves off and attacked the firewall process using techniques available to a malicious program. McAfee Personal Firewall Plus 6.0... Norton Personal Firewall 2005... mark for My Articles similar articles
InternetNews
March 16, 2004
Ryan Naraine
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. mark for My Articles similar articles
PC Magazine
August 19, 2003
Dennis Fisher
The Lookout: New Breed of Trojan Security researchers believe they have identified a new breed of Trojan horse that is infecting machines on the Internet, possibly in preparation for a larger coordinated attack. mark for My Articles similar articles
PC Magazine
August 17, 2004
Ellison & Caven
Unleash Your Printer Reviews of six wireless print servers for the home and small office, and two for business use. Hawking HWPS12UG... Axis OfficeBasic USB... Belkin F1UP001... etc. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
CIO
June 15, 2003
Dylan Tweney
Defensive Postures Intrusion prevention systems offer the latest countermeasures in the war against hackers, worms and viruses. mark for My Articles similar articles
CRM
September 2012
Judith Aquino
Avoid the Spam Folder How marketers can save outbound emails from the dreaded fate. mark for My Articles similar articles
InternetNews
April 21, 2004
Ryan Naraine
Cisco Rolls Major Patches to TCP Flaw Switches, routers, intrusion detection systems and VoIP phones are on the list needing patches to TCP flaw. mark for My Articles similar articles
National Defense
August 2012
Eric Beidel
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. mark for My Articles similar articles
PC World
December 2005
Stuart J. Johnston
Windows Bug Allows Repeat Invasions Microsoft recently released a Security Advisory for a Firewall quirk... Avoid a fake Google site... A problem with Windows updates... Fix Wi-Fi router problems... mark for My Articles similar articles