Admin Workshop: Resolvers Insider Tips: Resolving Names in DNSOct 01, 2005
The resolver is the window from your computer to the global DNS system. Simply typing a URL awakens a link to computers all over the world.more »
Charly's Column The Sysadmin’s Daily Grind: PortfwdSep 01, 2005
Incoming TCP connections do not always end up where they are supposed to. A freely configurable redirector points digital debris in the direction of a new and better place.more »
TCP Hijacking Understanding and preventing TCP attacksSep 01, 2005
It is quite easy to take a TCP connection down using a RST attack, and this risk increases with applications that need long-term connections, such as VPNs, DNS zone transfers, and BGP. We’ll describe how a TCP attack can happen, and we’ll show you some simple techniques for protecting your network.more »
Socks 5 Examining the generic Socks version 5 proxy protocolJul 01, 2005
Socks is a universal proxy protocol for TCP and UDP that allows internal hosts to securely pass the firewall and authenticates users. This article describes the latest version of the Socks proxy protocol and shows how to implement it.more »
ARP Spoofing ARP spoofing and poisoningJul 01, 2005
Any user on a LAN can sniff and manipulate local traffic. ARP spoofing and poisoning techniques give an attacker an easy way in.more »
Security Intro Knowing the ways of the enemyJul 01, 2005
SSPE Security Policies SSPE: Managing security policies for multiple firewallsJul 01, 2005
The Simple Security Policy Editor (SSPE) helps you organize your network and keep track of security policies across multiple firewalls. You can reference a central policy to generate rulesets for packet filters and VPN gateways.more »
The Bavarian capital shuns Microsoft, Google, and other alternatives to implement an open-source groupware solution.
Phone vendor partnerships bring Mark Shuttleworth's dream of Ubuntu on a phone a step closer to reality.
Donors will get to vote on new features for the free video editor.
Debian project puts init out to pasture and says no to Ubuntu's Upstart.
Ultra-sophisticated attack tool might have originated from a state-sponsored intelligence service.
New alternative for init comes with a small footprint and minimal configuration.
X marks the target for the next-generation windowing system.
Super-clone CentOS Linux gets beamed up to the mother ship.
HTML technology will enable new video editing and playback options.
New Linux distro is optimzed for gaming.