Linux Journal Contents #205, May 2011
Apr 30, 2011 By Staff
Live-Fire Security Testing with Armitage and Metasploit
by Raphael Mudge
Defend your network by attacking it. Armitage and Metasploit give you the same techniques skilled attackers use, in an easy-to-use package.
Virtual Security: Combating Actual Threats
by Jeramiah Bowling
Just because you've removed the physical, doesn't mean you've removed the risk.
Build a Better Firewall—Linux HA Firewall Tutorial
by Mike Horn
Use a combination of open-source packages to build and manage a Linux-based HA firewall pair that includes support for many of the advanced features commonly found in commercial firewalls.
Security Monitoring and Enforcement with Cfengine 3
by Aleksey Tsalolikhin
How can a configuration management tool increase security?
Installing an Alternate SSL Provider on Android
by Chris Conlon
A step-by-step tutorial on installing a third-party C library on Android.
Reuven M. Lerner's At the Forge
Dave Taylor's Work the Shell
Mad Libs Generator, Tweaks and Hacks
Mick Bauer's Paranoid Penguin
DNS Cache Poisoning, Part I
Kyle Rankin's Hack and /
Your Own Personal Server: Blog
Kyle Rankin and Bill Childers' Tales from the Server
Panic on the Streets of London
Doc Searls' EOF
The Limits of Scale
Untangle's Multi-Functional Firewall Software
by Shawn Powers
The Google Cr-48 Mario Chrome OS Notebook
by Daniel Bartholomew
In Every Issue
|Chemistry on the Desktop||Mar 23, 2017|
|Five HPC Cost Considerations to Maximize ROI||Mar 23, 2017|
|Two Ways GDPR Will Change Your Data Storage Solution||Mar 22, 2017|
|Android Candy: That App Is for the Birds!||Mar 22, 2017|
|Hodge Podge||Mar 21, 2017|
|William Rothwell and Nick Garner's Certified Ethical Hacker Complete Video Course (Pearson IT Certification)||Mar 20, 2017|
- Two Ways GDPR Will Change Your Data Storage Solution
- Chemistry on the Desktop
- Five HPC Cost Considerations to Maximize ROI
- Hodge Podge
- William Rothwell and Nick Garner's Certified Ethical Hacker Complete Video Course (Pearson IT Certification)
- Preseeding Full Disk Encryption
- Returning Values from Bash Functions
- Two Factors Are Better Than One
- Android Candy: That App Is for the Birds!
- GRUB Boot from ISO