Similar Articles |
|
Linux Journal April 1, 2002 Mick Bauer |
Paranoid Penguin: Hardening Sendmail The author examines sendmail's security controversies and builds an SMTP gateway for handling internet mail... |
Linux Journal December 1, 2006 George Belotsky |
A Server (Almost) of Your Own A virtual private server gives you root access without the high cost of a dedicated server. Here is how to set up e-mail on a VPS. |
RootPrompt.org September 11, 2000 |
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... |
RootPrompt.org September 7, 2000 Sander Plomp |
Amateur Fortress Building in Linux Part 1 Sander Plomp is tired of articles telling you to edit inetd.conf. So he wrote this article that looks at how to turn your system into amateur fortress in some interesting ways. |
RootPrompt.org April 24, 2000 Lance Spitzner |
Preparing Your Box For the Internet The basics of securing a Linux box. The examples provided here are based on Red Hat 6.0, but should apply to most Linux distributions. |
Unix Insider October 2000 Sandra Henry-Stocker |
Square one Security experts recommend turning off all network services you don't need in order to guard against possible attacks. But how do you know which services you don't need -- and which ones you do? A helpful breakdown of services that are safe to disable... |
Linux Journal October 2000 Mick Bauer & Brenno de Winter |
Using Postfix for Secure SMTP Gateways Improve your site's e-mail hygiene and make life difficult for spammers and hackers. |
Linux Journal March 2000 Jeff Regan |
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. |
Linux Journal June 2000 |
Best of Technical Support Route 675... Li Lo, Sweet Linux... Can't Get No Resolution... Driving Miss Printer... You've Got Mail |
Linux Journal August 25, 2004 Christian Herzog |
Building a Diskless 2.6 Firewall For your next DIY project, pick up an old Pentium computer and a CompactFlash card and build a custom router/firewall using Linux. |
RootPrompt.org September 13, 2000 Sander Plomp |
Amateur Fortress Building in Linux Part 2 Of course, deep down there is always some potential for catastrophic security hole - in the TCP stack, the kernel, whatever. That is inevitable. I can live with that. I just don't want it to be a biweekly event... |
Linux Journal March 2000 Tristan Greaves |
Network Monitoring with Linux Are you having trouble keeping your network under control? Here is an introduction to NOCOL: the freeware network monitoring system which will help you keep instability at bay. |
Linux Journal August 1, 2007 Tony Kay |
AlphaMail Is Scalable and Accessible Web Mail AlphaMail is a high-performance, feature-rich, open-source Web mail system. |
RootPrompt.org June 7, 2000 Lance Spitzner |
Know Your Enemy: A Forensic Analysis A study of an attack on a system. Instead of focusing on the tools and tactics used, he focuses on how he learned what happened and pieced the information together. The purpose is to give you the forensic skills necessary to analyze and learn the threats your organization faces... |
Linux Journal April 1, 2002 |
Best of Technical Support RPM Won't Let Me Upgrade... USB Keyboard Stopped Working... SuSE Won't Boot, Red Hat Won't Display... You Can't Log in Now; Get a Life... I Have No DHCP and I Must Network... Opening a File with filep_open... |
Linux Journal September 30, 2006 Albert Martorell |
SMART (Smart Monitoring and Rebooting Tool) If you want an agent to monitor and control services, you'll need to get SMART. It's wonderful having a colleague who is checking that everything works correctly 24/7 and who informs you about troubles after they already have been solved. |
Linux Journal May 2000 |
Best of Technical Support Lost Linux root password... Problems with sis6215 chip... ``modem busy''... Problems with 2nd CD-ROM drive... Printing... mgetty with modem... etc. |
Macworld April 2004 Michael Genrich |
E-mail Servers Four Software Packages for OS X Help You Deliver Your Message |
RootPrompt.org May 17, 2000 Lance Spitzner |
Watching Your Logs How to automate the filtering of your logs, freeing up your time while alerting you with the information you need. |
Linux Journal December 1, 2006 Mick Bauer |
Paranoid Penguin - Running Network Services under User-Mode Linux, Part II Our objective is to use User-Mode Linux to create one or more virtual guest machines, each running a different network service. That way, if one application on one guest machine gets compromised somehow, others won't be affected. |
Linux Journal June 1, 2002 David A. Bandel |
Kernel Korner: A NATural Progression A look at network address translation and how to avoid common errors when constructing iptables rules... |
Linux Journal May 2001 Neil Anuskiewicz |
An Introduction to DNS and DNS Tools The explosive growth of the Internet was made possible, in part, by DNS... |
RootPrompt.org June 26, 2000 Lance E. Spitzner |
Knowing When Someone Is Knocking Lance E. Spitzner tells us how you can protect yourself by detecting intrusion attempts and then covers what you can do about them. |
Linux Journal April 2000 Preston F. Crow |
The Linux Home Network Everything you need to know to make those Internet and intranet connections at home. |
Linux Journal September 2000 Russell J. T. Dyer |
Book Review: sendmail for Linux by Richard Blum A comprehensive, but not overwhelming, manual on sendmail for the intermediate-level Linux system administrator. |
RootPrompt.org May 8, 2000 Lance Spitzner |
Getting Your Interfaces to Talk How to configure, troubleshoot, and modify system interfaces under Solaris. |
Linux Journal April 2001 |
Best of Technical Support Programming with Shared Memory Segments... Nice Keyboard, but Where Are the Accent Marks?... Setting up Apache jserv... Install Problems on NEC Laptop... X on Intel 810... Blanking in VTs... Using a Parallel-Port Zip Drive... Moving from Microsoft to MySQL on Debian... |
JavaWorld August 29, 2003 Jason Kitchen |
Test email components in your software This article explains how to write a simple email server that can be easily integrated into your testing environment. |
PC Magazine April 20, 2004 Larry J. Seltzer |
Stopping Spam SMTP authentication can corral spam, but implementation is thorny. |
RootPrompt.org August 28, 2000 |
Security Etiquette So what is the proper etiquette for contacting the SysAdmin of a cracked box? |
PC Magazine September 14, 2011 Samara Lynn |
Hands On: Windows Server 8 Microsoft is calling Windows Server 8 a "game-changer." They might be right. |
RootPrompt.org March 13, 2000 Lance Spitzner |
Know Your Enemy: III In the third part of this three part series Lance Spitzner tells us about what happens once a Script Kiddie gains root. Specifically, how they cover their tracks and what they do next.... |
PC Magazine April 20, 2004 Sebastian Rupley |
New Spam-Busting Schemes Yahoo! and Microsoft push authentication methods. |
PC World February 2002 Scott Spanbauer |
Internet Tips Manage all of your e-mail accounts with one program, find a new domain registrar, set your IE Favorites as your home page... |
RootPrompt.org March 25, 2002 |
Linux Install / Reinstall Philosophy I've had a lot of practice installing slackware linux recently. As a result, I've worked out a new install philosophy... |
InternetNews March 22, 2006 Clint Boulton |
Security Firm Caulks Sendmail Exploit Security experts have found a flaw in Sendmail's server software that will allow an attacker to hijack a user's personal computer and view sensitive information. |
Popular Mechanics June 2007 Joel Johnson |
Hack Attack: Is the Whole Internet at Risk? Some hackers recently tried to take down the entire World Wide Web. You didn't even notice because the Internet is so robust. |
InternetNews February 25, 2004 Michael Singer |
Microsoft Proposes Caller ID for E-Mail In his quest to kill spam, Microsoft Chief Software Architect Bill Gates Tuesday appealed to security leadership, asking them to adopt his fledgling "Caller ID for E-mail" program. |
RootPrompt.org August 16, 2000 |
Review of Storm Linux 2000 I found this to be a well thought out and executed distribution. It is the closest thing to a kids and mom installation that I have used. I would recommend it to anyone installing Linux for the first time or someone looking for an installation for their newbie friends. |
PC World October 23, 2006 Scott Spanbauer |
Internet Tips: Drop POP E-Mail for the Freedom of IMAP Servers With an IMAP server, you can access your messages from anywhere. |
CIO February 15, 2003 Christopher Lindquist |
Mail It In Large corporations with extensive e-mail infrastructures have a new option from an old name -- Sendmail. The company has released Sendmail Mailcenter, a highly scalable, enterprise-class e-mail system designed for the most demanding environments. |
PC World July 2006 Scott Spanbauer |
Find the Name Behind a Malicious IP Address Use a command-line program to decode IP addresses... Create shortcuts to Web sites... Add a Firefox shortcut for find.pcworld.com... Clean up Google cookies... |
New Architect August 2002 Bret A. Fausett |
Blind Vigilantes Blackhole lists offer dark prospects for those unfairly judged to be spammers. |
Sports Illustrated May 1, 2000 Jack McCallum |
Getting rooted in the NBA playoffs Who to root for? |
InternetNews July 19, 2010 |
The Internet's DNS Gets Key Security Feature With the addition of DNSSEC, the Net's core infrastructure gains an important new security feature. |
InternetNews February 12, 2008 Sean Michael Kerner |
VeriSign Strengthens DNS For IPv6 DNS gets scaled for the challenge ahead, as the Internet infrastructure giant works to similarly ready its other systems. |
InternetNews August 13, 2004 Sean Michael Kerner |
DomainKeys Set to Send Mail We lock our homes and businesses with keys to protect against unwanted intrusion. So why not our e-mail? |