- Configuring the Cisco PIX Firewall for CA Site-to-Site
- Dec 28, 2001
- This sample chapter explains how to configure Cisco Secure PIX Firewall certificate
authority (CA) support for Internet Protocol Security (IPSec). The chapter shows you each major step of the configuration, including support tasks, IKE, and IPSec.
|
- Converting Sendmail to Postfix, Part One: Why Convert?
- Dec 28, 2001
- If you have a UNIX or Linux-based mail server, Postfix may be of interest to you. Read this first in a two-part series to find out why.
|
- Converting Sendmail to Postfix, Part Two: Configuring Postfix
- Dec 28, 2001
- How do you use the mail server Postfix? This second of two articles covers some basic configuration scenarios.
|
- Detecting Signs of Intrusion
- Dec 28, 2001
- This sample chapter should help you detect intrusions by looking for unexpected or suspicious behavior and "fingerprints" of known intrusion methods.
|
- Fun With Check Point Licensing
- Dec 28, 2001
- This article, derived from Essential Check Point Firewall-1: An Installation, Configuration, and Troubleshooting Guide, tackles one of the more challenging aspects of Check Point FireWall-1: licensing.
|
- Getting Your Check Point Firewall-1 Certifications
- Dec 28, 2001
- Dameon Welch Abernathy (Phoneboy) tells you how to tackle two certifications in Check Point FireWall-1: the CCSA and CCSE.
|
- Intrusion Detection: Cisco IDS Overview
- Dec 28, 2001
- Cisco Secure IDS is a network-based intrusion detection system that uses a signature database to trigger intrusion alarms.
|
- More Than a Firewall
- Dec 28, 2001
- Firewalls are a part of an overall process for providing security for your network, as explained in this article by Dameon Welch-Abernathy.
|
- Network Address Translation
- Dec 28, 2001
- This chapter discusses the topic of Network Address Translation (NAT): what
it is, why it was created, and how you can implement it in FireWall-1.
|
- Telecommunications: In War and Peace
- Dec 28, 2001
- The world is at war against a network of terrorists. Lillian Goleniewski examines the role of telecommunications in that context and tells why understanding its role and potential is paramount to national, business, and personal survival.
|
- A Quick and Dirty Introduction to OOP with PHP
- Dec 21, 2001
- Most PHP programs are written in the traditional style of programming, but PHP also can accommodate object-oriented programming (OOP), which is preferable when creating large programs. Chris Cosentino shows you here how to use OOP with PHP.
|
- PHP: Generating Email from Form Input
- Dec 21, 2001
- One of the easiest things to do in PHP is to generate an email from an HTML form. Chris Cosentino shows you how to do this with a few quick and easy steps.
|
- Securing the Corporate Network
- Dec 21, 2001
- Authenticate your dial-in users using your local database, and make sure your AAA is in place-- that's authentication, authorization, and accounting.
|
- Setting Cookies with PHP
- Dec 21, 2001
- Using cookies, you can automatically log users into your Web site when they load a page, or you can store temporary information such as items in a shopping cart. Chris Cosentino walks you through setting and deleting cookies in this article.
|
- Setting Up a Simple Database with PHP
- Dec 21, 2001
- PHP and MySQL go together like peanut butter and jelly. In this article, Chris Cosentino gives you a brief lesson in getting data into and out of a database using PHP.
|
- Uploading Files with PHP
- Dec 21, 2001
- PHP provides some simple functions for uploading files to your server from your desktop or the Web. Chris Cosentino shows you how to make file uploading a snap with PHP.
|
- Using SSL with Axis
- Dec 21, 2001
- Secure Socket Layer is based on a public key cryptography system, in which separate keys are used for encryption and decryption. This article reviews how to use SSL with Axis and addresses the combination of SSL server authentication and BASIC-AUTH.
|
- User Identity: Local Authentication
- Dec 14, 2001
- This sample chapter provides an overview of the basic components of successful local authentication.
|
- Web System Security
- Dec 14, 2001
- In this sample chapter from Quality Web Systems: Performance, Security, and Usability, authors Elfriede Dustin, Douglas McDiarmid, and Jeff Rashka discuss several aspects of Web system security.
|
- Breaking Unwanted TCP Connections by Modifying Your Route Table
- Dec 6, 2001
- Kyle Cassidy and Richard Cardona give you a quick-and-dirty explanation on route tables, to help you take advantage of a free and simple way to block unwanted traffic to specific IP addresses or subnets.
|