MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
RootPrompt.org
June 14, 2000
The Secrets of Snoop Lance Spitzner tell us about the secrets of Snoop: A passive approach to your network security. mark for My Articles similar articles
RootPrompt.org
August 30, 2000
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. mark for My Articles similar articles
Linux Journal
February 1, 2002
Gianluca Insolvibile
Inside the Linux Packet Filter In Part I of this two-part series on the Linux Packet Filter, the author describes a packet's journey through the kernel... mark for My Articles similar articles
Linux Journal
April 1, 2007
Dinil Divakaran
Starting a Linux Firewall from Scratch Here are the basic steps involved in developing a firewall from scratch, using tools in Linux. mark for My Articles similar articles
Linux Journal
March 2, 2007
Michael Rash
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. mark for My Articles similar articles
Unix Insider
November 2000
Sandra Henry-Stocker
Tapping on the walls Paring down your network services isn't the only way to protect your systems against attacks: port scanning can also be an effective tool. Here's how to stay one step ahead of your enemy... mark for My Articles similar articles
PC Magazine
October 5, 2004
Sheryl Canter
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. mark for My Articles similar articles
RootPrompt.org
May 1, 2000
Lance Spitzner
IDing remote hosts, without them knowing IDing remote hosts, without them knowing using Passive Fingerprinting. mark for My Articles similar articles
PC Magazine
February 15, 2006
Matthew D. Sarrel
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. mark for My Articles similar articles
Unix Insider
December 2000
Sandra Henry-Stocker
OS identification When hackers plan to break into Websites, they first try to find out which operating system the site is using. Once they determine that and which services are running, their chances of successfully attacking a system are greatly increased. What can you do to stop them? mark for My Articles similar articles
Linux Journal
April 2000
Preston F. Crow
The Linux Home Network Everything you need to know to make those Internet and intranet connections at home. mark for My Articles similar articles
PC Magazine
April 19, 2006
A Disconnecting Wireless Network Allocate the IP address permanently from the PC to avoid constant repairing of a connection after a computer has been in sleep mode. mark for My Articles similar articles
Home Toys
August 2004
John Schubert
Routers Versus Switches The simple solution is to determine if the customer is using an ISP without running any servers. If so, the installation will be easy, and the customer can be sold a router. If the customer needs more ports than are available on a single router, use switches. mark for My Articles similar articles
Linux Journal
June 1, 2002
David A. Bandel
Kernel Korner: A NATural Progression A look at network address translation and how to avoid common errors when constructing iptables rules... mark for My Articles similar articles
RootPrompt.org
May 29, 2000
Reto Haeni
Can IPv6 replace SSL? A brief overview of the features of IPv6 and its security specifications. In the later sections of the paper, he compares the security specifications of IPv6 to one of today's available security protocols, SSL (Secure Sockets Layer). mark for My Articles similar articles
Linux Journal
May 1, 2002
Pedro Paulo Ferreira Bueno
Understanding IDS for Linux A discussion of the different types of intrusion detection systems and how to create signatures to identify attacks... mark for My Articles similar articles
PC Magazine
December 22, 2004
Konstantinos Karagiannis
Sniffing out Secrets Whether you're interacting with someone in real time through an insecure protocol like instant messaging or sending sensitive information in an e-mail, your data can pass the virtual noses of many Ethernet interfaces. And some of those noses are sniffing. mark for My Articles similar articles
InternetNews
March 7, 2005
Sean Michael Kerner
'Land' Bug Back to Bedevil Microsoft Servers Windows Server 2003 and XP SP2 machines without properly configured firewalls are at risk of a Denial of Service attack via the "LAND" bug, according to a security researcher. mark for My Articles similar articles
PC World
January 2001
Alan Stafford
Warp Speed Web Access: Sharing the Bandwidth Broadband routers give your network a protected connection to the Internet... mark for My Articles similar articles
Linux Journal
March 2000
Jeff Regan
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. mark for My Articles similar articles
Linux Journal
March 1, 2007
Sean Walberg
Expose VoIP Problems Using Wireshark Sniff out VoIP problems with Wireshark, an open-source network protocol analyzer. VoIP involves a complex set of protocols that Wireshark can decode and relate to each other. mark for My Articles similar articles
Home Toys
June 2004
Internet based Monitoring using low cost solutions. Communications tools can be applied to the home alerting of water in the basement, heating or cooling system failures, Web Cam images, open doors, or windows, and complete alarm systems interfaces. mark for My Articles similar articles
PC Magazine
August 19, 2003
Dennis Fisher
The Lookout: New Breed of Trojan Security researchers believe they have identified a new breed of Trojan horse that is infecting machines on the Internet, possibly in preparation for a larger coordinated attack. mark for My Articles similar articles
PC Magazine
August 3, 2004
Keep Your PC Safe Learn to wield your firewall, antivirus, and antispyware tools expertly; don't give up your PC without a fight. mark for My Articles similar articles
PC Magazine
September 21, 2004
NAT Enough? A home router is not a complete security solution. mark for My Articles similar articles
PC Magazine
December 20, 2006
Should I "Stealth" This Port? The open port 443 on a router is used to access secure websites, so keep it available. mark for My Articles similar articles
PC World
March 11, 2001
Top 5 Firewall Utilities Protect your PC from suspicious activity on your network or the Internet... mark for My Articles similar articles
Home Toys
August 2002
Bob Hetherington
Compaq iPAQ CP-2W Connection Point and Wireless Network The CP-2W Connection point allows you to build a home network consisting of up to 4 ethernet and multiple 802.11 wireless computers all connected to a common internet port. Set-up was a snap. mark for My Articles similar articles
IEEE Spectrum
February 2010
Lubacz et al.
Vice Over IP: The VoIP Steganography Threat A growing cadre of criminals is hiding secret messages in voice data. mark for My Articles similar articles
Wired
October 2000
Jerome Kuptz
Independence Array How Gnutella and Napster actually work... mark for My Articles similar articles
RootPrompt.org
September 11, 2000
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... mark for My Articles similar articles
PC World
February 2006
Scott Spanbauer
Knowledge Is Power: Your Essential Internet Glossary Learn a few key terms to become more Internet savvy mark for My Articles similar articles
PC Magazine
March 16, 2009
Rist & Griffith
Home Networking in 5 Easy Steps Building a new home network doesn't have to be tough if you follow our five easy steps. mark for My Articles similar articles
PC Magazine
April 6, 2005
David A. Karp
Control a PC for Free With a remote control solution, you sit in front of one computer and view the desktop of another computer in a window. mark for My Articles similar articles
PC World
January 2005
Kirk Steers
Keep Your PC Hidden From the Bad Guys Guard your networked computers with a router's hardware firewall... Get your own router... What's the second thing you do when you think your PC has a hardware problem?... mark for My Articles similar articles
PC World
May 2005
Lincoln Spector
Hide Your Internet Ports From Snooping Hackers Closing open ports... Turning off Windows new program notification... Printing fonts and saving paper... etc. mark for My Articles similar articles
Macworld
May 2001
Brett Larson
Broadband Routers Affordable devices provide easy Internet sharing and network security... mark for My Articles similar articles
InternetNews
March 2, 2007
Sean Michael Kerner
IP Router And Carrier Ethernet Continue To Grow Analyst report shows strong growth for service provider routers and switches in 2006 and is expected to continue until at least 2010. mark for My Articles similar articles
JavaWorld
December 2001
Raghavan N. Srinivas
Java security evolution and concepts, Part 5 This article introduces J2SE (Java 2 Platform, Standard Edition) 1.4's new security packages for certificate chain manipulation, along with Generic Security Services, which includes a single sign-on framework over the network. mark for My Articles similar articles
PC World
March 22, 2007
Becky Waring
35 Easy Fixes for Network Problems Here's help for real-world hassles from dead spots to security threats to streaming-media hiccups. mark for My Articles similar articles
PC Magazine
May 2, 2008
Eric Griffith
How to Improve Your Home Wi-Fi Network Guarantee your wireless home network is up to snuff. mark for My Articles similar articles
Scientific American
September 2006
Tom Leighton
The Net's Real Security Problem Forget "phishing" for bank account passwords. The deepest threats to online security are the weaknesses in the fundamental protocols that run the Internet. mark for My Articles similar articles
PC Magazine
April 6, 2004
Stephanie Chang
Home Networking: From the Ground Up With blueprints in hand, we give the new home of contributing editors Bruce and Marge Brown a networking makeover. See what technologies we recommend for their home--and yours. mark for My Articles similar articles
PC Magazine
October 14, 2003
Michael J. Miller
Your Unwired World This extensive guide shows you how to stay wireless no matter where you are. mark for My Articles similar articles
InternetNews
November 1, 2004
Paul Shread
NetEx Speeds Up Storage Applications NetEx says its new accelerator can speed up storage applications across wide-area networks by a factor of 10. mark for My Articles similar articles
Military & Aerospace Electronics
October 2006
Ethernet switch revenue to reach $17.7 billion in 2009 The market for 10-Gigabit Ethernet switches is on a strong growth track and should continue in hot demand through 2010. mark for My Articles similar articles
PC Magazine
January 12, 2005
Craig Ellison
Making a Webcam Visible My office contains multiple computers networked together with a wired LAN. We have installed a "Networked Home Security Camera" that uses its own IP address. Any computer within the network can see what the camera sees. mark for My Articles similar articles
Military & Aerospace Electronics
July 2006
Steve Rood Goldman
Military Gigabit Ethernet: a TOE-to-TOE Comparison Ethernet's widespread use and longevity has resulted in an abundance of COTS hardware and network application software for military use. Fast Ethernet has been deployed for years and now Gigabit Ethernet is being designed into system upgrades and new weapon systems. mark for My Articles similar articles
Home Toys
June 2002
Bill Hubbard
Lights! Camera! Action! Install your very own camera system & make it available on the 'Net. mark for My Articles similar articles
Military & Aerospace Electronics
August 2006
Cisco-Based Mobile IP Network Router for Military and Rail Transit Applications Parvus Corp. is introducing the DuraMAR mobile Internet protocol (IP) router for harsh mobile environments in military and rail transit applications. mark for My Articles similar articles