Accessing PostgreSQL through JDBC via a Java SSL tunnel This article shows how to set up JDBC access for PostgreSQL on redhat 8.0 and how to create a SSL tunnel using Sun's Java Secured Socket Extensions, to enable secured access to a remote postgres database.
External attacks This article presents the different types of external attacks that a cracker can use.
Automating system administration with ssh and scp This article demonstrates the usage of ssh and scp commands to automate system administration jobs, such as installing and configuring software on Linux systems.
Intrusion detection with Debian GNU/Linux The article presents techniques and the tools for Debian GNU/Linux to detect and track people wo broke into your computer network.
Installation of a LAMP-Systems LAMP is an abbreviation for Linux Apache MySQL PHP. In this article you will learn how to install a Webserver based on LAMP.
Root-kit and integrity This article presents the different operations a cracker can do after having succeeded in entering a machine. We will also discuss what an administrator can do to detect that the machine has been jeopardized.
How to secure an heterogeneous network with free tools Security in computers networks is probably one of the biggest technology challenges of the 21st century. This article provides a general overview over the most important aspects.
Linux System Administration - A User's Guide (Book Review) This is a review of the book titled "Linux System Administration - A User's Guide" by Marcel Gagne. The book has 532 pages and 26 chapters that cover installation, daemons, run-levels,file systems, password policy, kernel building, printing, devices, backups, network administration, secure computing, and more.
Chrooting all services in Linux Chrooted system services improve security by limiting damage that someone who broke into the system can possibly do
A través del túnel Using free SSH with external applications on different OSes
Replicado de datos en tiempo real bajo Linux This article will explain on how to set an inexpensive real.time data replication system on Linux without need of special hardware. This kind of replication will be especially useful for ISPs or webhosts.
Usando distintos ISPs para su acceso a Internet In this article we develop configuration files to easily change between a number of different Internet Service Providers. We extend the configuration not only to one PC but to a whole network using IP masquerading. A DNS proxy will be used to make the changing DNS IP addresses invisible inside the masqueraded network.
Samba Configuration This article describes the configuration of Linux-samba, a server needed to control domains of networks based on MS-windows machines. Examples given here are based on Debian GNU/Linux and Samba 2.0.7
xinetd xinetd - extended Internet services daemon - provides an excellent security against the intrusions, and limit certain risks of attacks by Deny of Services ( DoS ). It allows, just like the most known pair ( inetd + tcpd ), to set access control to a computer, but its capacities extend well beyond. This article proposes you to discover them.
Construyendo ISPs escalables con software de código abierto In my last article, I introduced you to using LDAP on Linux. In this article, we will build a scalable ISP that can scale from one to any number of backend machines. The backbone of setting up this ISP is LDAP.
Bastille-Linux o cómo mejorar la seguridad de nuestro sistema Available by the beginning of june,version 1.1 of Bastille-Linux is not a new Linux Distribution but a set of security scripts. The authors have adopted a very pedagogic approach and one can learn a lot simply installing these scripts.
NFS - Sistema de Ficheros en Red Network File System (NFS) is a tool to manage files spread among several computers on a network as if they were on the same local machine. So, the final user does not have to worry of the exact location of its own files in order to access them.
Yellow Pages (Part III) In this last article about NIS, we explain how to install a NIS server. We will see which programs are used, configuration files and the building of the database.
Yellow Pages (Part II) My previous article was an introduction to the yellow pages and RPCs. This one explains how to configure a NIS client, how this client works and a small introduction to the different tools coming with NIS. Finally, we'll have a few words about NIS+
Introducción a LDAP sobre Linux This article will talk about the benefits of deploying LDAP in an organization and how to implement it on Linux.
Slackware 7.0 parte II: la Guía de la Configuración After the installation in the first part, the author now describes some basic configuration tasks in his now favorite Linux distribution. He explains how to configure X, how to compile a kernel (and how to use it with lilo), how to do user account management, how to dial in to internet and how to give your system some basic security.
Configurando IP-Masquerading IP-Masquerading provides the possibility to connect several computers to the Internet using a computer running Linux with just one public IP address.
Páginas Amarilla, 1ª parte The Network Information Service (NIS) manages a data base on server. Each computer on a network running a NIS client NIS can then poll the server for informations (login name,password, users and groups informations, ...).
Reciclando Direcciones IP con Apache This article demonstrates how to serve multiple virtual web servers using the same Ip address with Apache on Unix/Linux.
Como borrar Windows This article describes how to remove Windows and give the disk space to Linux without re-installing it
Japonés en Linux, Parte I This article takes a brief overview at how to make your Linux system Japanese-capable.
Caracteres Chinos en Linux This brief article describes how to enable Chinese locale on a "standard" Linux box.
Introducción al arranque en red y a Etherboot An advanced article that explains how to bootstrap your computer from a program stored in non-volatile memory without accessing your hard disk.
TCPD y Firewalls usando IPFWADM This article describes very briefly how to configure the inetd services in order to improve security on your system. We concentrate in the of the tool IPFWADM to administer and configure inetd services
Introduction to DNS You may have wondered what happens behind the scenes in Netscape after you enter a URL. This article will help you to understand the name-lookup process.
The X Display Manager The X Display Manager runs as a daemon on a host machine and manages multiple X displays.