Linux Journal Contents #120, April 2004
Apr 01, 2004 By Staff
Real-World PHP Security
by Xavier Spriet
Learn the top four PHP security mistakes and the three key techniques you can use to secure your PHP app.
by Meng Weng Wong
Spam, scams and worms all use e-mail forgery. Put a stop to it with the new mark of quality for your domain.
Security Distribution for Linux Clusters
by Ibrahim Haddad and Miroslaw Zakrzewski
Extend Linux Security Modules to enforce security rules across many systems.
Constructing Red Hat Enterprise Linux v. 3
by Tim Burke
Behind the scenes, contentious IT firms have their say in a new high-end distribution.
Samba Logging for Audit Trails
by Edward S. Kablaoui
When you have high-security audit requirements, use the source and add custom log entries.
Driving Me Nuts
by Greg Kroah-Hartman
Writing a Simple USB Driver
At the Forge
by Reuven M. Lerner
The Hidden Treasures of iptables
by Chris Lowth
Cooking with Linux
Francois, Can You Keep a Secret?
by Marcel Gagné
Application Proxying with Zorp, Part II
by Mick Bauer
Linux for Suits
by Doc Searls
SOLIS, a Brazilian Free Software Cooperative
by Cesar Brod
|PHP for Non-Developers||Jun 30, 2015|
|A Code Boot Camp for Underprivileged Kids||Jun 30, 2015|
|Comprehensive Identity Management and Audit for Red Hat Enterprise Linux||Jun 29, 2015|
|Linux Kernel 4.1 Released||Jun 26, 2015|
|Secure Server Deployments in Hostile Territory||Jun 25, 2015|
|Take Control of Growing Redis NoSQL Server Clusters||Jun 24, 2015|
- Comprehensive Identity Management and Audit for Red Hat Enterprise Linux
- A Code Boot Camp for Underprivileged Kids
- Linux Kernel 4.1 Released
- Secure Server Deployments in Hostile Territory
- PHP for Non-Developers
- Django Templates
- Cinnamon 2.6 Released
- Gettin' Sticky with It
- Attack of the Drones
- Take Control of Growing Redis NoSQL Server Clusters
Enjoyed this preview? Get the full course FREE from Linux Journal and Pluralsight.