Dear readers, I appear to have set a Paranoid Penguin record—six months spent on one article series. (It has consisted of five installments, with a one-month break between the second and third pieces.
How to configure SSH to use a non-standard port with SELinux set to enforcing Your email has been sent Switching the SSH listening port is an easy way to help secure remote login on your Linux servers ...
Linksys routers are designed to enable multiple devices to connect to the Internet at one time, but they often offer additional features as well. Some routers include a built-in firewall that protects ...
SolutionBase: Use the Web interface to configure and monitor an IPCop firewall Your email has been sent Get a thorough walk-through of the IPCop Web interface, as ...
It's no doubt that one of the leaders for network equipment is Cisco Systems. Newer Cisco devices are starting to use what Cisco calls its "="" operating="" system"="">, which is a customized flavor ...
Many server applications and remote administration use a Remote Procedure Call dynamic port allocation. Even though dynamic, they must follow a range rule as the customers or client machines can make ...