From: | "Unix Review News" <urnews@unixreview.email-publisher.com>
Subject: | UnixReview.com EXTRA! Vol. 3, Issue 35 | |
Date: | Tue, 27 Aug 2002 14:27:52 -0700 |
**********************************************************************
UNIXREVIEW.COM EXTRA!
August 27, 2002 Volume 3, Issue 35
**********************************************************************
FREE INSIDER'S GUIDE TO WEB MONITORING FROM FRESHWATER SOFTWARE
You need to be informed of Web availability issues 24/7. That's why
we created an Insider's Guide to Web Monitoring, a must-have if you're
responsible for Web availability or looking for immediate, proactive
monitoring. Visit:
http://click.unixreview.email-publisher.com/maaavaCaaTkmqa2siHBb/
for your FREE copy today!
**********************************************************************
THIS WEEK on UnixReview.com
Host Hardening and Intrusion Detection -- The Open Source Way
http://click.unixreview.email-publisher.com/maaavaCaaTkmra2siHBb/
by Thomas Weeks
Security consists of multi-tiered hardening and monitoring
methodologies
that exist as outer shells of protection, and more central, inner
layers.
The outer shells consist of systems such as router configurations,
firewalls, and Network Intrusion Detection Systems (or NIDS), which
form common methods for securing and watching entire LANs or WANs.
This article examines and illustrates the implementation of the inner
shells, or host-centric layers of server security.
The Open Road: wget and Debian 3.0
http://click.unixreview.email-publisher.com/maaavaCaaTkmsa2siHBb/
by Joe "Zonker" Brockmeier
This month, Zonker talks about the wget utility, a program that allows
you to download files via HTTP, HTTPS, and FTP, non-interactively; and
the latest and greatest Debian GNU/Linux release.
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Book Review by Ben Rothke
http://click.unixreview.email-publisher.com/maaavaCaaTkmta2siHBb/
Writing a book on wireless security is like writing a book on safe
skydiving -- if you want the safety and security, just don’t do it.
Hard-wired (cabled) networks have been around for decades and they
are still for the most part insecure. Wireless networking
(focusing on 802.11), which has been around for only a few years,
is clearly an insecure technology. With that, there is currently
not a lot to write about when it comes to effective wireless security.
**********************************************************************
Get over $5,000 worth of software, tools and training at the 2002
SunNetwork[sm] Conference and Pavilion.
Advance your knowledge with network identity, security, data
management,
edge computing, Web services, mobility, ROI, and more.
>>>September 18-20, 2002. Moscone Center, San Francisco.<<<
Make the net work for you -- register at
http://click.unixreview.email-publisher.com/maaavaCaaTkmua2siHBb/
**********************************************************************
*Thank You* for supporting UnixReview.com EXTRA!
CMP Media's Privacy Policy:
http://click.unixreview.email-publisher.com/maaavaCaaTkmva2siHBb/
**********************************************************************
Calling all System Administrators!
Learn the essential skills to keep pace in this rapidly evolving
Internet culture - attend LISA, the 16th Systems Administration
Conference & Tutorial Program, November 3-8 in Philadelphia, PA.
LISA'02 offers over 35 tutorials, Keynote Jim Reese, FREE Vendor
Exhibition, Expert practitioners, a special security track and much
more!
Register by October 11 and SAVE!
http://click.unixreview.email-publisher.com/maaavaCaaTkmwa2siHBb/
**********************************************************************
UnixReview.com EXTRA! is a weekly newsletter brought to you by
CMP Media LLC.
**********************************************************************