Call for papers

SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com

Infocus: Unix (Page 2 of 12)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
SSH User Identities
This article shows how to improve SSH security using public key authentication instead of, or in addition to, password authentication.
By: Brian Hatch 2004-11-03
http://www.securityfocus.com/infocus/1810

SSH Host Key Protection
This is the first in a series of articles on SSH in-depth. We start with looking at standard SSH host keys by examining the verification process to ensure you have not been the victim of an attack.
By: Brian Hatch 2004-10-14
http://www.securityfocus.com/infocus/1806

Securing Apache 2: Step-by-Step
Continuing the very popular "Securing" series from last year, this article discusses step-by-step how to compile, install, chroot and configure a secure Apache 2 web server.
By: Artur Maj 2004-06-21
http://www.securityfocus.com/infocus/1786

Solaris 10 Security
This article discusses the many new security features in Sun's Solaris 10 operating system, as well as Sun's holistic approach to security.
By: Ravi Iyer 2004-04-19
http://www.securityfocus.com/infocus/1776

Dogs of War: Securing Microsoft Groupware Environments with Unix (Part 2)
This article discusses the implementation of layered mail security using Unix as an MTA in front of Microsoft groupware products. Part two describes the use of Qmail, Qmail-Scanner, Clam AntiVirus and SpamAssassin.
By: Bob Rudis 2004-04-05
http://www.securityfocus.com/infocus/1772

Dogs of War: Securing Microsoft Groupware Environments with Unix (Part One)
This article discusses the implementation of layered mail security using Unix as MTA in front of Microsoft groupware products. Part one describes the use of Sendmail, MIMEDefang and SpamAssassin.
By: Bob Rudis 2004-03-26
http://www.securityfocus.com/infocus/1770

Oracle Row Level Security: Part 2
This paper explores the row level security feature added to Oracle 8i and above, and provides examples. One of the main uses of row level security is to allow all of a company's data to be stored in one database for different departments, or for a hosting company to store data for different companies in one database. Part Two.
By: Pete Finnigan 2003-11-17
http://www.securityfocus.com/infocus/1744

Oracle Row Level Security: Part 1
This paper explores the row level security feature added to Oracle 8i and above, and provides examples. One of the main uses of row level security is to allow all of a company's data to be stored in one database for different departments, or for a hosting company to store data for different companies in one database. Part One.
By: Pete Finnigan 2003-11-07
http://www.securityfocus.com/infocus/1743

Web Security Appliance With Apache and mod_security
This article will demonstrate how you can build your own application gateway with little effort, using open source components that are widely available.
By: Ivan Ristic 2003-10-21
http://www.securityfocus.com/infocus/1739

Securing MySQL: step-by-step
This article describes the basic steps which should be performed in order to secure a MySQL database against both local and remote attacks.
By: Artur Maj 2003-08-28
http://www.securityfocus.com/infocus/1726

Unix (Page 2 of 12)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus