Crypto Tricks Intro Disk-level cryptography in Linux

Nov 01, 2006

Today’s computers are fast enough for some very sophisticated cryptography techniques. We’ll show you how to keep your data safe from the prying eyes of snoops and spies.

more »

Charly's Column TUNNELING THE DUTCH BEACHES

Oct 01, 2006

What does Charly’s recent two-week vacation in Holland have in common with an SSH session? Nothing at all, at first sight. And therein lies a tale.

more »

Books

Oct 01, 2006
Defeating the Hacker Designing Interfaces...
more »

Perl: Link Spam A Perl script protects forums against spam

Oct 01, 2006

Spammers don’t just send email. They exploit discussion forums and blogs, posting pseudo-messages full of links to dupe search engines. A Perl script cleans up the mess.

more »

Charly's Column The Sysadmin’s Daily Grind: HTTP Antivirus Proxy

Sep 01, 2006

Browsers live in continual danger of compromise by a malicious site. An intermediate proxy combined with a virus scanner can help.

more »

Books

Sep 01, 2006
Collaboration Explained Linux Patch Management Software Security: Building Security In...
more »

Bot_Attack An insidious spam botnet attacks Charly

Aug 01, 2006

While going about his normal duties, Linux Magazine author Charly Kühnast was hit with a mean attack. Charly’s separate anti-spam server, which sits in front of his mail server, saved him from the mail storm.

more »

How to Write a Rootkit Rootkits for the Linux kernel 2.6

Aug 01, 2006

Today’s rootkits infiltrate a target system at kernel level, thus escaping unwanted attention from administrators. Read on for a practical look at how a kernel rootkit really works.

more »

Issue 170/2015

Buy this issue as a PDF

Digital Issue: Price $9.99
(incl. VAT)

News