Key questions when specifying a data centre automation platform.
Encryption, authentication and plugging leaks.
Jump to another channel and call in the law!
Put the paper work on line - and don't make anything go boom
Do VPNs and look for hotspots with multiple SSIDs.
TCP Wrappers (formerly LOG_TCP) is one of the many security utilities written by Wietse Venema. Here we examine its security uses.
This article highlights some of the security issues around the use of dynamic code environments, such as SSI, ASP and PHP.
A week in the life of an IT manager
Web servers are sitting targets for malicious attack. Here is a basic guide to server protection.
Tune the Samba server to deliver maximum performance
Mixing and matching for added security
This article can be read in combination with the previous How-to Securing router vulnerabilities
A more flexible approach to network management.
Signal distribution keeps Wi-Fi kit under lock and key
IP uses something called ARP to map IP addresses to the physical addresses that underpin them. This can compromise security, of course.
IOS has a new password security feature. Users beware.
Some issues to consider when running IPSec security over a VoIP network.
How to write a good security policy while avoiding the usual pitfall – nobody can understand a word of it.
Issues to weigh up before buying that most essential of modern security workhorses – the firewall.
What are the risks of using VPNs and how can you tell if a user becomes compromised? Read up on prevention and cure.
And maximise the life of some of your older hardware.
As multicast applications spread, a way of getting IPSec VPNs to work within this environment is useful. GRE tunnels are one way.
It's a matter of being sensible
Always wondered how to make a low-cost firewall? Here's how.
Mail servers are a front line security risk. This article shows you how to minimise the risks.