Linux Journal Contents #120, April 2004
Real-World PHP Security
by Xavier Spriet
Learn the top four PHP security mistakes and the three key techniques you can use to secure your PHP app.
by Meng Weng Wong
Spam, scams and worms all use e-mail forgery. Put a stop to it with the new mark of quality for your domain.
Security Distribution for Linux Clusters
by Ibrahim Haddad and Miroslaw Zakrzewski
Extend Linux Security Modules to enforce security rules across many systems.
Constructing Red Hat Enterprise Linux v. 3
by Tim Burke
Behind the scenes, contentious IT firms have their say in a new high-end distribution.
Samba Logging for Audit Trails
by Edward S. Kablaoui
When you have high-security audit requirements, use the source and add custom log entries.
Driving Me Nuts
by Greg Kroah-Hartman
Writing a Simple USB Driver
At the Forge
by Reuven M. Lerner
The Hidden Treasures of iptables
by Chris Lowth
Cooking with Linux
Francois, Can You Keep a Secret?
by Marcel Gagné
Application Proxying with Zorp, Part II
by Mick Bauer
Linux for Suits
by Doc Searls
SOLIS, a Brazilian Free Software Cooperative
by Cesar Brod