LJ Archive

Linux Journal Issue #165/January 2008


The Tao of Linux Security: Five Lessons for a Secure Deployment  by Jeramiah Bowling
Tighten up your systems from the start using this simple plan.
Digging Up Dirt in the DNS Hierarchy, Part I  by Ron Aitchison
Even when your DNS system is functioning normally, all may not be well below the surface.
Introduction to Forensics  by Kyle Rankin
Hit the ground running on your first forensics project with Autopsy and Sleuthkit.
PacketFence Revisited  by Regis Balzard and Dominik Gehl
PacketFence's extensive isolation mechanisms secure both your wired and wireless networks.


Interview with Eric Raymond  by Glyn Moody
Eric Raymond on open source.
GCC for Embedded Engineers  by Gene Sally
A look at how GCC works and how to get the most out of this marvel of modern software engineering.
GPG-Based Password Wallet  by Carl Welch
Forget your passwords.
Security in Qtopia Phones  by Lorn Potter
Open source doesn't mean insecure.
Separate the Static from the Dynamic with Tomcat and Apache  by Alan Berg
Efficiency tricks with Apache and Tomcat.
Creating VPNs with IPsec and SSL/TLS  by Rami Rosen
The two most common and current techniques for creating VPNs.


Reuven M. Lerner's At the Forge   Working with Facebook  
Marcel Gagné's Cooking with Linux   Security's Front Door  
Mick Bauer's Paranoid Penguin   Getting a Clue with WebGoat  
Dave Taylor's Work the Shell   Numerology, or the Number 23  
Kyle Rankin's Hack and /  Browse the Web without a Trace  
Doc Searls' EOF   Why to Build on FOSS in the First Place  

In Every Issue

New Products  
LJ Archive