LJ Archive

Linux Journal Issue #249/January 2015

Features

How to Perform an Internal Security Review  by Jeramiah Bowling
Be prepared. Be proactive. Take the time to review.
Flexible Access Control with Squid Proxy  by Mike Diehl
Database-driven access control for Squid.
Security in Three Ds: Detect, Decide and Deny  by Federico Kereki
Detect hackers and block them with DenyHosts.

Columns

Reuven M. Lerner's At the Forge   Users, Permissions and Multitenant Sites  
Dave Taylor's Work the Shell   The find|xargs Sequence  
Kyle Rankin's Hack and /   Secure Server Deployments in Hostile Territory  
Shawn Powers' The Open-Source Classroom   Vagrant Simplified  
Doc Searls' EOF   Hats Off to Mozilla  

In Every Issue

Current_Issue.tar.gz  
Letters  
upFRONT  
New Products  
LJ Archive