Similar Articles |
|
RootPrompt.org June 14, 2000 |
The Secrets of Snoop Lance Spitzner tell us about the secrets of Snoop: A passive approach to your network security. |
RootPrompt.org August 30, 2000 |
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. |
Linux Journal February 1, 2002 Gianluca Insolvibile |
Inside the Linux Packet Filter In Part I of this two-part series on the Linux Packet Filter, the author describes a packet's journey through the kernel... |
Linux Journal April 1, 2007 Dinil Divakaran |
Starting a Linux Firewall from Scratch Here are the basic steps involved in developing a firewall from scratch, using tools in Linux. |
Linux Journal March 2, 2007 Michael Rash |
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. |
Unix Insider November 2000 Sandra Henry-Stocker |
Tapping on the walls Paring down your network services isn't the only way to protect your systems against attacks: port scanning can also be an effective tool. Here's how to stay one step ahead of your enemy... |
PC Magazine October 5, 2004 Sheryl Canter |
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. |
RootPrompt.org May 1, 2000 Lance Spitzner |
IDing remote hosts, without them knowing IDing remote hosts, without them knowing using Passive Fingerprinting. |
PC Magazine February 15, 2006 Matthew D. Sarrel |
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. |
Unix Insider December 2000 Sandra Henry-Stocker |
OS identification When hackers plan to break into Websites, they first try to find out which operating system the site is using. Once they determine that and which services are running, their chances of successfully attacking a system are greatly increased. What can you do to stop them? |
Linux Journal April 2000 Preston F. Crow |
The Linux Home Network Everything you need to know to make those Internet and intranet connections at home. |
PC Magazine April 19, 2006 |
A Disconnecting Wireless Network Allocate the IP address permanently from the PC to avoid constant repairing of a connection after a computer has been in sleep mode. |
Home Toys August 2004 John Schubert |
Routers Versus Switches The simple solution is to determine if the customer is using an ISP without running any servers. If so, the installation will be easy, and the customer can be sold a router. If the customer needs more ports than are available on a single router, use switches. |
Linux Journal June 1, 2002 David A. Bandel |
Kernel Korner: A NATural Progression A look at network address translation and how to avoid common errors when constructing iptables rules... |
RootPrompt.org May 29, 2000 Reto Haeni |
Can IPv6 replace SSL? A brief overview of the features of IPv6 and its security specifications. In the later sections of the paper, he compares the security specifications of IPv6 to one of today's available security protocols, SSL (Secure Sockets Layer). |
Linux Journal May 1, 2002 Pedro Paulo Ferreira Bueno |
Understanding IDS for Linux A discussion of the different types of intrusion detection systems and how to create signatures to identify attacks... |
PC Magazine December 22, 2004 Konstantinos Karagiannis |
Sniffing out Secrets Whether you're interacting with someone in real time through an insecure protocol like instant messaging or sending sensitive information in an e-mail, your data can pass the virtual noses of many Ethernet interfaces. And some of those noses are sniffing. |
InternetNews March 7, 2005 Sean Michael Kerner |
'Land' Bug Back to Bedevil Microsoft Servers Windows Server 2003 and XP SP2 machines without properly configured firewalls are at risk of a Denial of Service attack via the "LAND" bug, according to a security researcher. |
PC World January 2001 Alan Stafford |
Warp Speed Web Access: Sharing the Bandwidth Broadband routers give your network a protected connection to the Internet... |
Linux Journal March 2000 Jeff Regan |
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. |
Linux Journal March 1, 2007 Sean Walberg |
Expose VoIP Problems Using Wireshark Sniff out VoIP problems with Wireshark, an open-source network protocol analyzer. VoIP involves a complex set of protocols that Wireshark can decode and relate to each other. |
Home Toys June 2004 |
Internet based Monitoring using low cost solutions. Communications tools can be applied to the home alerting of water in the basement, heating or cooling system failures, Web Cam images, open doors, or windows, and complete alarm systems interfaces. |
PC Magazine August 19, 2003 Dennis Fisher |
The Lookout: New Breed of Trojan Security researchers believe they have identified a new breed of Trojan horse that is infecting machines on the Internet, possibly in preparation for a larger coordinated attack. |
PC Magazine August 3, 2004 |
Keep Your PC Safe Learn to wield your firewall, antivirus, and antispyware tools expertly; don't give up your PC without a fight. |
PC Magazine September 21, 2004 |
NAT Enough? A home router is not a complete security solution. |
PC Magazine December 20, 2006 |
Should I "Stealth" This Port? The open port 443 on a router is used to access secure websites, so keep it available. |
PC World March 11, 2001 |
Top 5 Firewall Utilities Protect your PC from suspicious activity on your network or the Internet... |
Home Toys August 2002 Bob Hetherington |
Compaq iPAQ CP-2W Connection Point and Wireless Network The CP-2W Connection point allows you to build a home network consisting of up to 4 ethernet and multiple 802.11 wireless computers all connected to a common internet port. Set-up was a snap. |
IEEE Spectrum February 2010 Lubacz et al. |
Vice Over IP: The VoIP Steganography Threat A growing cadre of criminals is hiding secret messages in voice data. |
Wired October 2000 Jerome Kuptz |
Independence Array How Gnutella and Napster actually work... |
RootPrompt.org September 11, 2000 |
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... |
PC World February 2006 Scott Spanbauer |
Knowledge Is Power: Your Essential Internet Glossary Learn a few key terms to become more Internet savvy |
PC Magazine March 16, 2009 Rist & Griffith |
Home Networking in 5 Easy Steps Building a new home network doesn't have to be tough if you follow our five easy steps. |
PC Magazine April 6, 2005 David A. Karp |
Control a PC for Free With a remote control solution, you sit in front of one computer and view the desktop of another computer in a window. |
PC World January 2005 Kirk Steers |
Keep Your PC Hidden From the Bad Guys Guard your networked computers with a router's hardware firewall... Get your own router... What's the second thing you do when you think your PC has a hardware problem?... |
PC World May 2005 Lincoln Spector |
Hide Your Internet Ports From Snooping Hackers Closing open ports... Turning off Windows new program notification... Printing fonts and saving paper... etc. |
Macworld May 2001 Brett Larson |
Broadband Routers Affordable devices provide easy Internet sharing and network security... |
InternetNews March 2, 2007 Sean Michael Kerner |
IP Router And Carrier Ethernet Continue To Grow Analyst report shows strong growth for service provider routers and switches in 2006 and is expected to continue until at least 2010. |
JavaWorld December 2001 Raghavan N. Srinivas |
Java security evolution and concepts, Part 5 This article introduces J2SE (Java 2 Platform, Standard Edition) 1.4's new security packages for certificate chain manipulation, along with Generic Security Services, which includes a single sign-on framework over the network. |
PC World March 22, 2007 Becky Waring |
35 Easy Fixes for Network Problems Here's help for real-world hassles from dead spots to security threats to streaming-media hiccups. |
PC Magazine May 2, 2008 Eric Griffith |
How to Improve Your Home Wi-Fi Network Guarantee your wireless home network is up to snuff. |
Scientific American September 2006 Tom Leighton |
The Net's Real Security Problem Forget "phishing" for bank account passwords. The deepest threats to online security are the weaknesses in the fundamental protocols that run the Internet. |
PC Magazine April 6, 2004 Stephanie Chang |
Home Networking: From the Ground Up With blueprints in hand, we give the new home of contributing editors Bruce and Marge Brown a networking makeover. See what technologies we recommend for their home--and yours. |
PC Magazine October 14, 2003 Michael J. Miller |
Your Unwired World This extensive guide shows you how to stay wireless no matter where you are. |
InternetNews November 1, 2004 Paul Shread |
NetEx Speeds Up Storage Applications NetEx says its new accelerator can speed up storage applications across wide-area networks by a factor of 10. |
Military & Aerospace Electronics October 2006 |
Ethernet switch revenue to reach $17.7 billion in 2009 The market for 10-Gigabit Ethernet switches is on a strong growth track and should continue in hot demand through 2010. |
PC Magazine January 12, 2005 Craig Ellison |
Making a Webcam Visible My office contains multiple computers networked together with a wired LAN. We have installed a "Networked Home Security Camera" that uses its own IP address. Any computer within the network can see what the camera sees. |
Military & Aerospace Electronics July 2006 Steve Rood Goldman |
Military Gigabit Ethernet: a TOE-to-TOE Comparison Ethernet's widespread use and longevity has resulted in an abundance of COTS hardware and network application software for military use. Fast Ethernet has been deployed for years and now Gigabit Ethernet is being designed into system upgrades and new weapon systems. |
Home Toys June 2002 Bill Hubbard |
Lights! Camera! Action! Install your very own camera system & make it available on the 'Net. |
Military & Aerospace Electronics August 2006 |
Cisco-Based Mobile IP Network Router for Military and Rail Transit Applications Parvus Corp. is introducing the DuraMAR mobile Internet protocol (IP) router for harsh mobile environments in military and rail transit applications. |