MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Computers & Electronics / Unix

Magazine articles on Unix.
Old Articles: <Older 21-30 Newer>
Linux Journal
July 2000
Ralph Krause
Book Review: Teach Yourself Emacs in 24 Hours While I can say I learned enough from the book to use Emacs (I'm using it to write this review), I would hesitate to recommend this book to anyone else. The biggest problem I found was the sheer number of typos it contained. mark for My Articles 8 similar articles
RootPrompt.org
June 19, 2000
Noel D.
Trust and the System Administrator A System Administrator has a strange relationship with the equipment they manage, with the people using their system and with the world outside their systems. I will overview some of the choices and decisions that Sys Admins must understand when building or maintaining their systems. mark for My Articles 62 similar articles
RootPrompt.org
June 14, 2000
The Secrets of Snoop Lance Spitzner tell us about the secrets of Snoop: A passive approach to your network security. mark for My Articles 96 similar articles
RootPrompt.org
June 7, 2000
Lance Spitzner
Know Your Enemy: A Forensic Analysis A study of an attack on a system. Instead of focusing on the tools and tactics used, he focuses on how he learned what happened and pieced the information together. The purpose is to give you the forensic skills necessary to analyze and learn the threats your organization faces... mark for My Articles 91 similar articles
RootPrompt.org
May 31, 2000
Noel
Cracked! Part 4: The Sniffer Noel continues the story of when some Unix boxes that he helped admin were cracked. This article tells how they found the sniffer that the cracker was running on their network and what they did next.... mark for My Articles 16 similar articles
Linux Journal
June 2000
Marjorie Richardson
Book Review Linux & Unix Shell Programming by David Tansley mark for My Articles 205 similar articles
RootPrompt.org
May 24, 2000
Peter Gutmann
Secure Deletion of Data With the use of increasingly sophisticated encryption systems, an attacker wishing to gain access to sensitive data is forced to look elsewhere for information.... mark for My Articles 72 similar articles
RootPrompt.org
May 22, 2000
Noel
Cracked! Part 3: Hunting the Hunter Noel continues the story of when some Unix boxes that he helped admin were cracked. This article talks about some of the efforts made to track down the cracker and some surprises.... mark for My Articles 17 similar articles
RootPrompt.org
May 17, 2000
Lance Spitzner
Watching Your Logs How to automate the filtering of your logs, freeing up your time while alerting you with the information you need. mark for My Articles 29 similar articles
RootPrompt.org
May 10, 2000
Noel
Cracked! Part 2: Watching and Waiting In the second article Noel continues the story of when some Unix boxes that he helped admin were cracked. This article talks about watching the cracker with a sniffer and talking to the the FBI's Computer Crimes Squad.... mark for My Articles 18 similar articles
<Older 21-30 Newer>    Return to current articles.