Advanced search
Linux Journal
Issue #249/January 2015
Features
How to Perform an Internal Security Review
by Jeramiah Bowling
Be prepared. Be proactive. Take the time to review.
Flexible Access Control with Squid Proxy
by Mike Diehl
Database-driven access control for Squid.
Security in Three Ds: Detect, Decide and Deny
by Federico Kereki
Detect hackers and block them with DenyHosts.
Columns
Reuven M. Lerner's At the Forge
Users, Permissions and Multitenant Sites
Dave Taylor's Work the Shell
The
find|xargs
Sequence
Kyle Rankin's Hack and /
Secure Server Deployments in Hostile Territory
Shawn Powers' The Open-Source Classroom
Vagrant Simplified
Doc Searls' EOF
Hats Off to Mozilla
In Every Issue
Current_Issue.tar.gz
Letters
upFRONT
New Products
Archive Index
Advanced search
Copyright © 1994 - 2019
Linux Journal
. All rights reserved.