LJ Archive

Linux Journal Issue #249/January 2015


How to Perform an Internal Security Review  by Jeramiah Bowling
Be prepared. Be proactive. Take the time to review.
Flexible Access Control with Squid Proxy  by Mike Diehl
Database-driven access control for Squid.
Security in Three Ds: Detect, Decide and Deny  by Federico Kereki
Detect hackers and block them with DenyHosts.


Reuven M. Lerner's At the Forge   Users, Permissions and Multitenant Sites  
Dave Taylor's Work the Shell   The find|xargs Sequence  
Kyle Rankin's Hack and /   Secure Server Deployments in Hostile Territory  
Shawn Powers' The Open-Source Classroom   Vagrant Simplified  
Doc Searls' EOF   Hats Off to Mozilla  

In Every Issue

New Products  
LJ Archive