Spam Test Comparing antispam appliances and services

Jul 11, 2008

Spam filters can help smooth the waves in your inbox, as long as they are reliable and don’t have too many side effects. We’ll show you what we found when we tested five antispam appliances and two service providers.

more »

IMAP spam filter Intelligent filtering with Qmail, SpamAssassin, and Maildrop

Jul 10, 2008

We’ll show you a custom solution for moving spam to a separate folder and adding new spam signatures to SpamAssassin.

more »

Isof Looking for intruders with lsof

Jul 10, 2008

Track down and expose intruders with the versatile admin tool lsof.

more »

Backdoors Techniques for building a hidden backdoor

Jul 09, 2008

Backdoors give attackers unrestricted access to a zombie system. If you plan to stop the bad guys from settling in, you’ll be interested in this analysis of the tools they might use for building a private entrance.

more »

Charly's Column The sys admin’s daily grind: WebCalendar

Jun 20, 2008

Users log on to services such as SSH, ftp, SASL, POP3, IMAP, Apache htaccess, and many more using their names and passwords. These popular access mechanisms are a potential target for brute-force attacks. An attentive bouncer will keep dictionary attacks at bay.

more »

Single-Packet Port Knocking Remote access security with single-packet port knocking

Jun 01, 2008

If you are looking for an extra layer of remote access security, try single-packet port knocking.

more »

Access Control Lists Working with Access Control Lists

Jun 01, 2008

The ancient Linux permission system is often insufficient for complex production environments. Access Control Lists offer a flexible alternative.

more »

SE Linux Mandatory Access Control (MAC) with SELinux

Jun 01, 2008

SELinux provides a safer system through the powerful concept of mandatory access controls.

more »

Issue 170/2015

Buy this issue as a PDF

Digital Issue: Price $9.99
(incl. VAT)

News