Call for papers

SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com

Infocus: Unix (Page 1 of 12)   1 2 3 4 5 6 7 8 9 10 11  Next >
Recent Security Enhancements in NetBSD
NetBSD is renowned for its focus on portability, but great care is also given to security. This paper presents the NetBSD philosophy on security, major design decisions, and its current security features. Following the discussion, current and future research is presented to provide a good look at NetBSD's direction.
By: Elad Efrat 2006-10-03
http://www.securityfocus.com/infocus/1878

Analyzing Malicious SSH Login Attempts
Malicious SSH login attempts have been appearing in some administrators' logs for several years. This article takes a new look at the use of honeypots to analyze malicious SSH login attempts and see what can be learned about this activity. The article then offers recommendations on how to secure one's system against these attacks.
By: Christian Seifert 2006-09-11
http://www.securityfocus.com/infocus/1876

After an Exploit: mitigation and remediation
This article describes a few hardening and alerting methods for Unix servers that help block vectors for various attacks, including two web-based application attacks, DNS issues, and the brute-forcing of SSH passwords. The article then looks at steps to take and lessons learned post-compromise.
By: Jamie Riden 2006-07-24
http://www.securityfocus.com/infocus/1871

Zero to IPSec in 4 minutes
This short article looks at how to get a fully functional IPSec VPN up and running between two fresh OpenBSD installations in about four minutes flat.
By: Dragos Ruiu 2006-02-28
http://www.securityfocus.com/infocus/1859

Chrooted Snort on Solaris
This article discusses the installation and configuration of a chrooted Snort IDS on most versions of Solaris.
By: Andre Lue-Fook-Sang 2005-05-18
http://www.securityfocus.com/infocus/1837

Apache 2 with SSL/TLS: Step-by-Step, Part 3
This article concludes our three part series dedicated to configuring Apache 2.0 with SSL/TLS support, for maximum security and optimal performance of SSL based e-commerce transactions.
By: Artur Maj 2005-03-01
http://www.securityfocus.com/infocus/1823

Apache 2 with SSL/TLS: Step-by-Step, Part 2
Part two of the Apache2 with SSL/TLS series offers mod_ssl recommendations and then discusses three different ways to sign a certificate, including setting up a local Certificate Authority using OpenSSL.
By: Artur Maj 2005-02-02
http://www.securityfocus.com/infocus/1820

Apache 2 with SSL/TLS: Step-by-Step, Part 1
This article begins a series of three articles dedicated to configuring Apache 2.0 with SSL/TLS support, in order to ensure maximum security and optimal performance of secure web communication. This part introduces key aspects of SSL/TLS and then shows how to compile and configure Apache 2.0 with support for these protocols.
By: Artur Maj 2005-01-18
http://www.securityfocus.com/infocus/1818

SSH Port Forwarding
In this article we look at SSH Port Forwarding in detail, as it is a very useful but often misunderstood technology. SSH Port Forwarding can be used for secure communications in a myriad of different ways.
By: Brian Hatch 2005-01-06
http://www.securityfocus.com/infocus/1816

SSH and ssh-agent
This article discusses how to take SSH Identity/Pubkey trust relationships to the next level, by using ssh-agent as a keymaster to manage a user's authentication needs automatically.
By: Brian Hatch 2004-11-23
http://www.securityfocus.com/infocus/1812

Unix (Page 1 of 12)   1 2 3 4 5 6 7 8 9 10 11  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus