Here’s how to safeguard your identity and your personal data in the age of the social Web. More: continued here
Learn about the Conficker worm, how it spreads, and how to remove it from your computer if you’re infected. More: continued here
To filter the nimda virus, add the file name that is used to infect machines to a keyword list. Then associate the keyword with a category and make the Block Keyword setting active for that category. Example:Â nimda.eml Keywords offer protection against sites that have not been explicitly added to the Master Database or to a [...]
This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem [...]
The Virtual Private Network – VPN – has attracted the attention of many organizations looking to both expand their networking capabilities and reduce their costs. The VPN can be found in workplaces and homes, where they allow employees to safely log into company networks. Telecommuters and those who travel often find a VPN a more [...]
Although a PC used for writing doesn’t need to be a high-performance computer, its performance can be improved by a good partitioning scheme. The biggest boost comes from my Paging partition on drive H, which is found on my second physical disk. I use this partition to boost performance in the following ways: Move the [...]
Most Linux distributions ship with tcp_wrappers “wrapping” all your TCP services. A tcp_wrapper (known asÂ /usr/sbin/tcpd) is invoked from/sbin/inetdÂ instead of the real service, such asÂ telnetÂ orÂ ftp.Â tcpdÂ then checks the host that is requesting the service and either executes the real server or denies access from that host.Â tcpdÂ allows you to restrict access to your tcp services. You should make [...]
Looking forÂ freeÂ Open SourceÂ AntivirusÂ for Windows? DownloadÂ ClamWin Free Antivirusand getÂ freeÂ virus scanning andÂ freeÂ virus definition updates.ClamWin is a Free Antivirus program for Microsoft Windows 98/Me/2000/XP/2003 and Vista. Anti-virus software tends to be big and bloated, use plenty of RAM and system resources, and generally clog up your system. Worse is that increasingly, anti-virus makers make it difficult to buy [...]
Usually a firewall is used to protect a server from other servers and networks. However, in some cases you may also want to protect a server within a network by using a TCP Wrapper. The Xinetd super server that comes with most Linux distributions includes a built-in TCP wrapper. It can be used to explicitly [...]
While one type of storage media is usually sufficient for smaller companies, large enterprises will often have a mixed storage environment, implementing different mediums for specific departments, workgroups and remote offices. In this paper, we will provide an overview of DAS, NAS and SAN to help you determine which solution, or combination of solutions, will best help you achieve your business goals
pfSense is a free, open source customized distribution of FreeBSD tailored for use as a firewall and router. In addition to being a powerful, flexible firewalling and routing platform, it includes a long list of related features and a package system allowing further expandability without adding bloat and potential security vulnerabilities to the base distribution. [...]
The network-to-network setup allows you to connect two office networks into one Virtual Private Network, while the Road Warrior connection secures a laptop’s telecommute to work. Our examples also show the basic procedure on the Linux Openswan side where another IPsec peer is in play.Shortcut to net-to-net.Shortcut to Road Warrior.
The HTTP status code can provide some insight into the types of operations surfers are trying to attempt and may help to isolate problems with your pages, not the operation of the Apache. For example 404 errors are generated when someone tries to access a web page that doesn’t exist anymore. This could be caused by incorrect URL links in other pages on you site. Table 20-4 has some of the more common examples.
You can password protect content in both the main and subdirectories of your DocumentRoot fairly easily. I know people who allow normal access to their regular Web pages, but require passwords for directories or pages that show MRTG or Webalizer data. This example shows how to password protect the /home/www directory. 1) Use Apache’s htpasswd [...]