AppArmor Hardening systems with AppArmor

May 01, 2006

After penetrating a remote system, intruders might think they are home and dry, but AppArmor spoils the fun, locking the miscreants in a virtual cage.

more »

Nmap Methods Understanding Nmap analysis techniques

Jan 01, 2006

How does the popular Nmap scanner identify holes in network security? In this article, we examine some Nmap analysis techniques.

more »

INFECTIONS

Jan 01, 2006
The prospect of devoting an issue to viruses in Linux launched a lively conversation in our 5000-mile-wide virtual......
more »

Charly's Column The Sysadmin’s Daily Grind: Tor

Nov 01, 2005

Some people don’t mind leaving traces of their IP address wherever they go, others prefer to use a tool like The Onion Router.

more »

Java Anonymous Proxy Anonymous surfing with Java Anonymous Proxy

Nov 01, 2005

Many Websites log IP addresses and access times to identify users. If you don’t want to wind up as data in someone’s market research, the Java Anonymous Proxy will keep your surfing secret.

more »

Squid proxy server Implementing a home proxy server with Squid

Nov 01, 2005

A proxy server provides safer and more efficient surfing. Although commercial proxy solutions are available, all you really need is Linux and an old PC in the attic.

more »

XSA Attack Stopping the cross-site authentication attack

Nov 01, 2005

A new form of phishing attack deposits an HTML tag on the vulnerable service to trap users into authenticating.

more »

Web Filters Privoxy and Webcleaner content filters

Oct 01, 2005

Content filters protect a web user’s privacy and keep the flood of unsolicited advertising at bay. We’ll show you a pair of popular Open Source content filters.

more »

Issue 170/2015

Buy this issue as a PDF

Digital Issue: Price $9.99
(incl. VAT)

News