MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Linux Journal
April 1, 2002
Mick Bauer
Paranoid Penguin: Hardening Sendmail The author examines sendmail's security controversies and builds an SMTP gateway for handling internet mail... mark for My Articles similar articles
Linux Journal
December 1, 2006
George Belotsky
A Server (Almost) of Your Own A virtual private server gives you root access without the high cost of a dedicated server. Here is how to set up e-mail on a VPS. mark for My Articles similar articles
RootPrompt.org
September 11, 2000
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... mark for My Articles similar articles
RootPrompt.org
September 7, 2000
Sander Plomp
Amateur Fortress Building in Linux Part 1 Sander Plomp is tired of articles telling you to edit inetd.conf. So he wrote this article that looks at how to turn your system into amateur fortress in some interesting ways. mark for My Articles similar articles
RootPrompt.org
April 24, 2000
Lance Spitzner
Preparing Your Box For the Internet The basics of securing a Linux box. The examples provided here are based on Red Hat 6.0, but should apply to most Linux distributions. mark for My Articles similar articles
Unix Insider
October 2000
Sandra Henry-Stocker
Square one Security experts recommend turning off all network services you don't need in order to guard against possible attacks. But how do you know which services you don't need -- and which ones you do? A helpful breakdown of services that are safe to disable... mark for My Articles similar articles
Linux Journal
October 2000
Mick Bauer & Brenno de Winter
Using Postfix for Secure SMTP Gateways Improve your site's e-mail hygiene and make life difficult for spammers and hackers. mark for My Articles similar articles
Linux Journal
March 2000
Jeff Regan
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. mark for My Articles similar articles
Linux Journal
June 2000
Best of Technical Support Route 675... Li Lo, Sweet Linux... Can't Get No Resolution... Driving Miss Printer... You've Got Mail mark for My Articles similar articles
Linux Journal
August 25, 2004
Christian Herzog
Building a Diskless 2.6 Firewall For your next DIY project, pick up an old Pentium computer and a CompactFlash card and build a custom router/firewall using Linux. mark for My Articles similar articles
RootPrompt.org
September 13, 2000
Sander Plomp
Amateur Fortress Building in Linux Part 2 Of course, deep down there is always some potential for catastrophic security hole - in the TCP stack, the kernel, whatever. That is inevitable. I can live with that. I just don't want it to be a biweekly event... mark for My Articles similar articles
Linux Journal
March 2000
Tristan Greaves
Network Monitoring with Linux Are you having trouble keeping your network under control? Here is an introduction to NOCOL: the freeware network monitoring system which will help you keep instability at bay. mark for My Articles similar articles
Linux Journal
August 1, 2007
Tony Kay
AlphaMail Is Scalable and Accessible Web Mail AlphaMail is a high-performance, feature-rich, open-source Web mail system. mark for My Articles similar articles
RootPrompt.org
June 7, 2000
Lance Spitzner
Know Your Enemy: A Forensic Analysis A study of an attack on a system. Instead of focusing on the tools and tactics used, he focuses on how he learned what happened and pieced the information together. The purpose is to give you the forensic skills necessary to analyze and learn the threats your organization faces... mark for My Articles similar articles
Linux Journal
April 1, 2002
Best of Technical Support RPM Won't Let Me Upgrade... USB Keyboard Stopped Working... SuSE Won't Boot, Red Hat Won't Display... You Can't Log in Now; Get a Life... I Have No DHCP and I Must Network... Opening a File with filep_open... mark for My Articles similar articles
Linux Journal
September 30, 2006
Albert Martorell
SMART (Smart Monitoring and Rebooting Tool) If you want an agent to monitor and control services, you'll need to get SMART. It's wonderful having a colleague who is checking that everything works correctly 24/7 and who informs you about troubles after they already have been solved. mark for My Articles similar articles
Linux Journal
May 2000
Best of Technical Support Lost Linux root password... Problems with sis6215 chip... ``modem busy''... Problems with 2nd CD-ROM drive... Printing... mgetty with modem... etc. mark for My Articles similar articles
Macworld
April 2004
Michael Genrich
E-mail Servers Four Software Packages for OS X Help You Deliver Your Message mark for My Articles similar articles
RootPrompt.org
May 17, 2000
Lance Spitzner
Watching Your Logs How to automate the filtering of your logs, freeing up your time while alerting you with the information you need. mark for My Articles similar articles
Linux Journal
December 1, 2006
Mick Bauer
Paranoid Penguin - Running Network Services under User-Mode Linux, Part II Our objective is to use User-Mode Linux to create one or more virtual guest machines, each running a different network service. That way, if one application on one guest machine gets compromised somehow, others won't be affected. mark for My Articles similar articles
Linux Journal
June 1, 2002
David A. Bandel
Kernel Korner: A NATural Progression A look at network address translation and how to avoid common errors when constructing iptables rules... mark for My Articles similar articles
Linux Journal
May 2001
Neil Anuskiewicz
An Introduction to DNS and DNS Tools The explosive growth of the Internet was made possible, in part, by DNS... mark for My Articles similar articles
RootPrompt.org
June 26, 2000
Lance E. Spitzner
Knowing When Someone Is Knocking Lance E. Spitzner tells us how you can protect yourself by detecting intrusion attempts and then covers what you can do about them. mark for My Articles similar articles
Linux Journal
April 2000
Preston F. Crow
The Linux Home Network Everything you need to know to make those Internet and intranet connections at home. mark for My Articles similar articles
Linux Journal
September 2000
Russell J. T. Dyer
Book Review: sendmail for Linux by Richard Blum A comprehensive, but not overwhelming, manual on sendmail for the intermediate-level Linux system administrator. mark for My Articles similar articles
RootPrompt.org
May 8, 2000
Lance Spitzner
Getting Your Interfaces to Talk How to configure, troubleshoot, and modify system interfaces under Solaris. mark for My Articles similar articles
Linux Journal
April 2001
Best of Technical Support Programming with Shared Memory Segments... Nice Keyboard, but Where Are the Accent Marks?... Setting up Apache jserv... Install Problems on NEC Laptop... X on Intel 810... Blanking in VTs... Using a Parallel-Port Zip Drive... Moving from Microsoft to MySQL on Debian... mark for My Articles similar articles
JavaWorld
August 29, 2003
Jason Kitchen
Test email components in your software This article explains how to write a simple email server that can be easily integrated into your testing environment. mark for My Articles similar articles
PC Magazine
April 20, 2004
Larry J. Seltzer
Stopping Spam SMTP authentication can corral spam, but implementation is thorny. mark for My Articles similar articles
RootPrompt.org
August 28, 2000
Security Etiquette So what is the proper etiquette for contacting the SysAdmin of a cracked box? mark for My Articles similar articles
PC Magazine
September 14, 2011
Samara Lynn
Hands On: Windows Server 8 Microsoft is calling Windows Server 8 a "game-changer." They might be right. mark for My Articles similar articles
RootPrompt.org
March 13, 2000
Lance Spitzner
Know Your Enemy: III In the third part of this three part series Lance Spitzner tells us about what happens once a Script Kiddie gains root. Specifically, how they cover their tracks and what they do next.... mark for My Articles similar articles
PC Magazine
April 20, 2004
Sebastian Rupley
New Spam-Busting Schemes Yahoo! and Microsoft push authentication methods. mark for My Articles similar articles
PC World
February 2002
Scott Spanbauer
Internet Tips Manage all of your e-mail accounts with one program, find a new domain registrar, set your IE Favorites as your home page... mark for My Articles similar articles
RootPrompt.org
March 25, 2002
Linux Install / Reinstall Philosophy I've had a lot of practice installing slackware linux recently. As a result, I've worked out a new install philosophy... mark for My Articles similar articles
InternetNews
March 22, 2006
Clint Boulton
Security Firm Caulks Sendmail Exploit Security experts have found a flaw in Sendmail's server software that will allow an attacker to hijack a user's personal computer and view sensitive information. mark for My Articles similar articles
Popular Mechanics
June 2007
Joel Johnson
Hack Attack: Is the Whole Internet at Risk? Some hackers recently tried to take down the entire World Wide Web. You didn't even notice because the Internet is so robust. mark for My Articles similar articles
InternetNews
February 25, 2004
Michael Singer
Microsoft Proposes Caller ID for E-Mail In his quest to kill spam, Microsoft Chief Software Architect Bill Gates Tuesday appealed to security leadership, asking them to adopt his fledgling "Caller ID for E-mail" program. mark for My Articles similar articles
RootPrompt.org
August 16, 2000
Review of Storm Linux 2000 I found this to be a well thought out and executed distribution. It is the closest thing to a kids and mom installation that I have used. I would recommend it to anyone installing Linux for the first time or someone looking for an installation for their newbie friends. mark for My Articles similar articles
PC World
October 23, 2006
Scott Spanbauer
Internet Tips: Drop POP E-Mail for the Freedom of IMAP Servers With an IMAP server, you can access your messages from anywhere. mark for My Articles similar articles
CIO
February 15, 2003
Christopher Lindquist
Mail It In Large corporations with extensive e-mail infrastructures have a new option from an old name -- Sendmail. The company has released Sendmail Mailcenter, a highly scalable, enterprise-class e-mail system designed for the most demanding environments. mark for My Articles similar articles
PC World
July 2006
Scott Spanbauer
Find the Name Behind a Malicious IP Address Use a command-line program to decode IP addresses... Create shortcuts to Web sites... Add a Firefox shortcut for find.pcworld.com... Clean up Google cookies... mark for My Articles similar articles
New Architect
August 2002
Bret A. Fausett
Blind Vigilantes Blackhole lists offer dark prospects for those unfairly judged to be spammers. mark for My Articles similar articles
Sports Illustrated
May 1, 2000
Jack McCallum
Getting rooted in the NBA playoffs Who to root for? mark for My Articles similar articles
InternetNews
July 19, 2010
The Internet's DNS Gets Key Security Feature With the addition of DNSSEC, the Net's core infrastructure gains an important new security feature. mark for My Articles similar articles
InternetNews
February 12, 2008
Sean Michael Kerner
VeriSign Strengthens DNS For IPv6 DNS gets scaled for the challenge ahead, as the Internet infrastructure giant works to similarly ready its other systems. mark for My Articles similar articles
InternetNews
August 13, 2004
Sean Michael Kerner
DomainKeys Set to Send Mail We lock our homes and businesses with keys to protect against unwanted intrusion. So why not our e-mail? mark for My Articles similar articles