Kerberos, final bits
Two weeks ago, I explained how to set up a Kerberos realm; and last week, I went on to describe how to actually do something useful with it by doing Kerberized NFS. But there’s so much more interesting...
View ArticleBook review: Pro Apache XML by Poornachandra Sarang, Ph.D.
Pro Apache XML, authored by Poornachandra Sarang, PhD, and published by Apress, clearly explains XML, and, in specific, the Apache Software Foundation-related projects. eXtensible Markup Language (XML)...
View ArticleOpenXDAS
No one would argue that software auditing is not an important feature of mission critical applications. If a software based process is critical to the life of your company, then so is the security and...
View ArticleYou can’t be too careful
Having a web page is probably the most complex of the 'simple' tasks available. The typical process pipeline would begin with DNS, converting a human-friendly name into an IP address, and would be...
View ArticleFirewall Builder
Have you ever wanted to configure a personal firewall for your GNU/Linux box, but were scared of the complexity of iptables? Well, I might not be able to make you a security expert, but I can show you...
View ArticleIntroduction to Firestarter
Most modern GNU/Linux distributions are secure with their default minimal installs, whether desktop or server, while some distributions are designed specifically with security in mind. However, any...
View ArticleAnd the luddites shall inherit the world (wide web)...
With the lay public now moving their businesses and lives online, everything they do has an electronic component. But, being lay people, they’re using the most antiquated, bug-ridden,...
View ArticleBook review: Virtual Honeypots: From Botnet Tracking to Intrusion Detection...
Honeypots look like victim systems waiting or searching for malware and other nefarious attacks, registering the enemy's practices in high-resolution gory, blood-ridden detail. Virtualization allows...
View ArticleBook review: Security PowerTools by Nicolas Beauchesne et al
Security has always been a concern when using a computer. First, we thought physical security was enough. After all, if the computer is in the house, how could anyone else get to it? But in today’s...
View ArticleBook review: Security Data Visualization by Greg Conti
Eighty percent of input to the brain is visual, and comes directly through the eyes. We humans are incredible machines with the ability to recognize patterns instantaneously. Machine technology is not...
View ArticleBook review: Linux Firewalls: Attack Detection and Response with iptables,...
The stability of an enterprise-wide infrastructure depends on understanding innovative, defensive security-related software. Linux Firewalls: Attack Detection and Response with iptables, psad and...
View ArticleProtect your server with Deny Hosts
Requiring system accessibility via the Internet poses several problems for system administrators. One problem is allowing access by authorized users with the least amount of complexity on the client...
View ArticleConfigure a professional firewall using pfSense
The guide will take you through the setup of the pfSense firewall with one WAN interface, one LAN interface and one Opt1-WiFi Interface.This guide was written for Linksys, Netgear, and D-link users...
View ArticleSelf-signed certificates and Firefox 3 - a possible solution
Some websites need to handle data securely and assure the end-user they are a) secure and b) who they say they are. The traditional way to achieve these is via Secure Socket Layer. Firefox 3 changed...
View ArticleThe Bizarre Cathedral - 48
Latest from the Bizarre Cathedral.Category: HumourTagging: gnu/linuxsecuritywindowsthebizarrecathedralworms
View ArticleThe Bizarre Cathedral - 49
Latest from the Bizarre Cathedral.Category: HumourTagging: gnu/linuxsecuritythebizarrecathedralexchangeworms
View ArticlePut your webcams to good use with iSpy camera security software.
Installed home surveillance systems can cost thousands of dollars, they are expensive to maintain and costly to upgrade. Lying around your house right now you've probably got all the ingredients you...
View ArticlePractical guide to TCP Syn Port scanner from SecPoint
Do you know if your server or your home computer has unnecessary ports open to the internet? These days most of the people have multiple devices which are constantly connected to the internet; each and...
View ArticleThe Googlisation of Surveillance: The UK Communications Data Bill
There is a belief that democracies respect the rights of their citizens. Well, they don't. There is a great deal of cant written about that but even the democratic modern state has become so big, so...
View ArticleThe simple guide to bitcoins using Electrum
Bitcoin is the most established digital currency available today. It provides a safe, anonymous way to send and receive a virtual currency everybody trusts. However, managing bitcoins is not quite as...
View Article
More Pages to Explore .....