Home > Articles > Security

Security

722 Items

Sort by Date | Title

Configuring the Cisco PIX Firewall for CA Site-to-Site
Dec 28, 2001
This sample chapter explains how to configure Cisco Secure PIX Firewall certificate authority (CA) support for Internet Protocol Security (IPSec). The chapter shows you each major step of the configuration, including support tasks, IKE, and IPSec.
Converting Sendmail to Postfix, Part One: Why Convert?
Dec 28, 2001
If you have a UNIX or Linux-based mail server, Postfix may be of interest to you. Read this first in a two-part series to find out why.
Converting Sendmail to Postfix, Part Two: Configuring Postfix
Dec 28, 2001
How do you use the mail server Postfix? This second of two articles covers some basic configuration scenarios.
Detecting Signs of Intrusion
Dec 28, 2001
This sample chapter should help you detect intrusions by looking for unexpected or suspicious behavior and "fingerprints" of known intrusion methods.
Fun With Check Point Licensing
Dec 28, 2001
This article, derived from Essential Check Point Firewall-1: An Installation, Configuration, and Troubleshooting Guide, tackles one of the more challenging aspects of Check Point FireWall-1: licensing.
Getting Your Check Point Firewall-1 Certifications
Dec 28, 2001
Dameon Welch Abernathy (Phoneboy) tells you how to tackle two certifications in Check Point FireWall-1: the CCSA and CCSE.
Intrusion Detection: Cisco IDS Overview
Dec 28, 2001
Cisco Secure IDS is a network-based intrusion detection system that uses a signature database to trigger intrusion alarms.
More Than a Firewall
Dec 28, 2001
Firewalls are a part of an overall process for providing security for your network, as explained in this article by Dameon Welch-Abernathy.
Network Address Translation
Dec 28, 2001
This chapter discusses the topic of Network Address Translation (NAT): what it is, why it was created, and how you can implement it in FireWall-1.
Telecommunications: In War and Peace
Dec 28, 2001
The world is at war against a network of terrorists. Lillian Goleniewski examines the role of telecommunications in that context and tells why understanding its role and potential is paramount to national, business, and personal survival.
A Quick and Dirty Introduction to OOP with PHP
Dec 21, 2001
Most PHP programs are written in the traditional style of programming, but PHP also can accommodate object-oriented programming (OOP), which is preferable when creating large programs. Chris Cosentino shows you here how to use OOP with PHP.
PHP: Generating Email from Form Input
Dec 21, 2001
One of the easiest things to do in PHP is to generate an email from an HTML form. Chris Cosentino shows you how to do this with a few quick and easy steps.
Securing the Corporate Network
Dec 21, 2001
Authenticate your dial-in users using your local database, and make sure your AAA is in place-- that's authentication, authorization, and accounting.
Setting Cookies with PHP
Dec 21, 2001
Using cookies, you can automatically log users into your Web site when they load a page, or you can store temporary information such as items in a shopping cart. Chris Cosentino walks you through setting and deleting cookies in this article.
Setting Up a Simple Database with PHP
Dec 21, 2001
PHP and MySQL go together like peanut butter and jelly. In this article, Chris Cosentino gives you a brief lesson in getting data into and out of a database using PHP.
Uploading Files with PHP
Dec 21, 2001
PHP provides some simple functions for uploading files to your server from your desktop or the Web. Chris Cosentino shows you how to make file uploading a snap with PHP.
Using SSL with Axis
Dec 21, 2001
Secure Socket Layer is based on a public key cryptography system, in which separate keys are used for encryption and decryption. This article reviews how to use SSL with Axis and addresses the combination of SSL server authentication and BASIC-AUTH.
User Identity: Local Authentication
Dec 14, 2001
This sample chapter provides an overview of the basic components of successful local authentication.
Web System Security
Dec 14, 2001
In this sample chapter from Quality Web Systems: Performance, Security, and Usability, authors Elfriede Dustin, Douglas McDiarmid, and Jeff Rashka discuss several aspects of Web system security.
Breaking Unwanted TCP Connections by Modifying Your Route Table
Dec 6, 2001
Kyle Cassidy and Richard Cardona give you a quick-and-dirty explanation on route tables, to help you take advantage of a free and simple way to block unwanted traffic to specific IP addresses or subnets.

<< < Prev Page 31 32 33 34 35 Next >