Quantcast
Channel: Free Software Magazine - security
Browsing latest articles
Browse All 22 View Live

Kerberos, final bits

Two weeks ago, I explained how to set up a Kerberos realm; and last week, I went on to describe how to actually do something useful with it by doing Kerberized NFS. But there’s so much more interesting...

View Article



Book review: Pro Apache XML by Poornachandra Sarang, Ph.D.

Pro Apache XML, authored by Poornachandra Sarang, PhD, and published by Apress, clearly explains XML, and, in specific, the Apache Software Foundation-related projects. eXtensible Markup Language (XML)...

View Article

OpenXDAS

No one would argue that software auditing is not an important feature of mission critical applications. If a software based process is critical to the life of your company, then so is the security and...

View Article

You can’t be too careful

Having a web page is probably the most complex of the 'simple' tasks available. The typical process pipeline would begin with DNS, converting a human-friendly name into an IP address, and would be...

View Article

Firewall Builder

Have you ever wanted to configure a personal firewall for your GNU/Linux box, but were scared of the complexity of iptables? Well, I might not be able to make you a security expert, but I can show you...

View Article


Introduction to Firestarter

Most modern GNU/Linux distributions are secure with their default minimal installs, whether desktop or server, while some distributions are designed specifically with security in mind. However, any...

View Article

And the luddites shall inherit the world (wide web)...

With the lay public now moving their businesses and lives online, everything they do has an electronic component. But, being lay people, they’re using the most antiquated, bug-ridden,...

View Article

Book review: Virtual Honeypots: From Botnet Tracking to Intrusion Detection...

Honeypots look like victim systems waiting or searching for malware and other nefarious attacks, registering the enemy's practices in high-resolution gory, blood-ridden detail. Virtualization allows...

View Article


Book review: Security PowerTools by Nicolas Beauchesne et al

Security has always been a concern when using a computer. First, we thought physical security was enough. After all, if the computer is in the house, how could anyone else get to it? But in today’s...

View Article


Book review: Security Data Visualization by Greg Conti

Eighty percent of input to the brain is visual, and comes directly through the eyes. We humans are incredible machines with the ability to recognize patterns instantaneously. Machine technology is not...

View Article

Book review: Linux Firewalls: Attack Detection and Response with iptables,...

The stability of an enterprise-wide infrastructure depends on understanding innovative, defensive security-related software. Linux Firewalls: Attack Detection and Response with iptables, psad and...

View Article

Protect your server with Deny Hosts

Requiring system accessibility via the Internet poses several problems for system administrators. One problem is allowing access by authorized users with the least amount of complexity on the client...

View Article

Configure a professional firewall using pfSense

The guide will take you through the setup of the pfSense firewall with one WAN interface, one LAN interface and one Opt1-WiFi Interface.This guide was written for Linksys, Netgear, and D-link users...

View Article


Self-signed certificates and Firefox 3 - a possible solution

Some websites need to handle data securely and assure the end-user they are a) secure and b) who they say they are. The traditional way to achieve these is via Secure Socket Layer. Firefox 3 changed...

View Article

The Bizarre Cathedral - 48

Latest from the Bizarre Cathedral.Category: HumourTagging: gnu/linuxsecuritywindowsthebizarrecathedralworms

View Article


The Bizarre Cathedral - 49

Latest from the Bizarre Cathedral.Category: HumourTagging: gnu/linuxsecuritythebizarrecathedralexchangeworms

View Article

Put your webcams to good use with iSpy camera security software.

Installed home surveillance systems can cost thousands of dollars, they are expensive to maintain and costly to upgrade. Lying around your house right now you've probably got all the ingredients you...

View Article


Image may be NSFW.
Clik here to view.

Practical guide to TCP Syn Port scanner from SecPoint

Do you know if your server or your home computer has unnecessary ports open to the internet? These days most of the people have multiple devices which are constantly connected to the internet; each and...

View Article

Image may be NSFW.
Clik here to view.

The Googlisation of Surveillance: The UK Communications Data Bill

There is a belief that democracies respect the rights of their citizens. Well, they don't. There is a great deal of cant written about that but even the democratic modern state has become so big, so...

View Article

Image may be NSFW.
Clik here to view.

The simple guide to bitcoins using Electrum

Bitcoin is the most established digital currency available today. It provides a safe, anonymous way to send and receive a virtual currency everybody trusts. However, managing bitcoins is not quite as...

View Article
Browsing latest articles
Browse All 22 View Live




Latest Images