Security Lessons Cross-site scripting request forgeries

Jan 31, 2009

Sometimes, even ING, YouTube, The New York Times, and Google get it wrong.

more »

Security Strategies Technologies and tools for safer networks

Jan 31, 2009

Is your data safe? Are your borders protected? This month we examine some expert techniques for building more secure networks.

more »

VoIP Security Securing VoIP networks

Jan 31, 2009

Eavesdropping on conversations on a LAN is easier than ever thanks to insecure VoIP installations. You don't need to bug restaurant booths or tap phone lines – standard Linux tools are all a hacker needs.

more »

Wireless LAN Security Security strategies for wireless networks

Jan 31, 2009

WLANs give you Internet access without a bird's nest of wiring. But if you don't take security seriously, you might find yourself with uninvited guests.

more »

One-Time Passwords on the Web Implementing a one-time password system on the web

Jan 31, 2009

Add security to your website with a one-time password system.

more »

Charly's Column The sys admin's (and the professor's) daily grind: Do-it-yourself antispam blacklists

Jan 31, 2009

At the Niederrhein University future admins implement spam defense mechanisms by attracting the attention of the Viagra Mafia. The results are pertinacious blacklists and expert knowledge of methods for combating the menace.

more »

Surviving NFS 3 NFS 3 and the specter of the spoof attack

Jan 31, 2009

Host-based authentication is easy to configure, but it doesn't do much to stop uninvited guests.

more »

Clickjacking Threat To Firefox

Jan 30, 2009

Counterfeit links are able to deceive the Firefox and Chrome browsers, directing users to unintended websites.

more »
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News