Linux Journal Contents #205, May 2011
Live-Fire Security Testing with Armitage and Metasploit
by Raphael Mudge
Defend your network by attacking it. Armitage and Metasploit give you the same techniques skilled attackers use, in an easy-to-use package.
Virtual Security: Combating Actual Threats
by Jeramiah Bowling
Just because you've removed the physical, doesn't mean you've removed the risk.
Build a Better Firewall—Linux HA Firewall Tutorial
by Mike Horn
Use a combination of open-source packages to build and manage a Linux-based HA firewall pair that includes support for many of the advanced features commonly found in commercial firewalls.
Security Monitoring and Enforcement with Cfengine 3
by Aleksey Tsalolikhin
How can a configuration management tool increase security?
Installing an Alternate SSL Provider on Android
by Chris Conlon
A step-by-step tutorial on installing a third-party C library on Android.
Reuven M. Lerner's At the Forge
Dave Taylor's Work the Shell
Mad Libs Generator, Tweaks and Hacks
Mick Bauer's Paranoid Penguin
DNS Cache Poisoning, Part I
Kyle Rankin's Hack and /
Your Own Personal Server: Blog
Kyle Rankin and Bill Childers' Tales from the Server
Panic on the Streets of London
Doc Searls' EOF
The Limits of Scale
Untangle's Multi-Functional Firewall Software
by Shawn Powers
The Google Cr-48 Mario Chrome OS Notebook
by Daniel Bartholomew
In Every Issue
|Free Today: September Issue of Linux Journal (Retail value: $5.99)||Sep 27, 2016|
|nginx||Sep 27, 2016|
|Epiq Solutions' Sidekiq M.2||Sep 26, 2016|
|Nativ Disc||Sep 23, 2016|
|Android Browser Security--What You Haven't Been Told||Sep 22, 2016|
|The Many Paths to a Solution||Sep 21, 2016|
- Android Browser Security--What You Haven't Been Told
- Readers' Choice Awards 2013
- Epiq Solutions' Sidekiq M.2
- Nativ Disc
- The Many Paths to a Solution
- Synopsys' Coverity
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- Returning Values from Bash Functions
- Securing the Programmer
Pick up any e-commerce web or mobile app today, and you’ll be holding a mashup of interconnected applications and services from a variety of different providers. For instance, when you connect to Amazon’s e-commerce app, cookies, tags and pixels that are monitored by solutions like Exact Target, BazaarVoice, Bing, Shopzilla, Liveramp and Google Tag Manager track every action you take. You’re presented with special offers and coupons based on your viewing and buying patterns. If you find something you want for your birthday, a third party manages your wish list, which you can share through multiple social- media outlets or email to a friend. When you select something to buy, you find yourself presented with similar items as kind suggestions. And when you finally check out, you’re offered the ability to pay with promo codes, gifts cards, PayPal or a variety of credit cards.Get the Guide