Linux Journal Contents #120, April 2004
Apr 01, 2004 By Staff
Real-World PHP Security
by Xavier Spriet
Learn the top four PHP security mistakes and the three key techniques you can use to secure your PHP app.
by Meng Weng Wong
Spam, scams and worms all use e-mail forgery. Put a stop to it with the new mark of quality for your domain.
Security Distribution for Linux Clusters
by Ibrahim Haddad and Miroslaw Zakrzewski
Extend Linux Security Modules to enforce security rules across many systems.
Constructing Red Hat Enterprise Linux v. 3
by Tim Burke
Behind the scenes, contentious IT firms have their say in a new high-end distribution.
Samba Logging for Audit Trails
by Edward S. Kablaoui
When you have high-security audit requirements, use the source and add custom log entries.
Driving Me Nuts
by Greg Kroah-Hartman
Writing a Simple USB Driver
At the Forge
by Reuven M. Lerner
The Hidden Treasures of iptables
by Chris Lowth
Cooking with Linux
Francois, Can You Keep a Secret?
by Marcel Gagné
Application Proxying with Zorp, Part II
by Mick Bauer
Linux for Suits
by Doc Searls
SOLIS, a Brazilian Free Software Cooperative
by Cesar Brod
Free DevOps eBooks, Videos, and more!
Regardless of where you are in your DevOps process, Linux Journal can help!
We offer here the DEFINITIVE DevOps for Dummies, a mobile Application Development Primer, and advice & help from the expert sources like:
- Linux Journal
- New Products
- Flexible Access Control with Squid Proxy
- Users, Permissions and Multitenant Sites
- Security in Three Ds: Detect, Decide and Deny
- High-Availability Storage with HA-LVM
- Tighten Up SSH
- DevOps: Everything You Need to Know
- Solving ODEs on Linux
- Non-Linux FOSS: MenuMeters
- diff -u: What's New in Kernel Development