Squid proxy server Implementing a home proxy server with SquidOct 31, 2005
A proxy server provides safer and more efficient surfing. Although commercial proxy solutions are available, all you really need is Linux and an old PC in the attic.more »
XSA Attack Stopping the cross-site authentication attackOct 31, 2005
A new form of phishing attack deposits an HTML tag on the vulnerable service to trap users into authenticating.more »
Web Filters Privoxy and Webcleaner content filtersSep 30, 2005
Content filters protect a web user’s privacy and keep the flood of unsolicited advertising at bay. We’ll show you a pair of popular Open Source content filters.more »
Socks 5 Examining the generic Socks version 5 proxy protocolJun 30, 2005
Socks is a universal proxy protocol for TCP and UDP that allows internal hosts to securely pass the firewall and authenticates users. This article describes the latest version of the Socks proxy protocol and shows how to implement it.more »
Anonymous Email Anonymous Remail with MixmasterApr 30, 2005
Anonymous remail protects the sender’s identity against potential eavesdroppers. The Mixmaster protocol gives users a mature technology for anonymous remail, and the text-based Mixmaster client is an example of a free remailer application.more »
Admin Workshop Identd Insider Tips: Identd with Linux-based ServersMar 31, 2005
In last month’s issue of Admin Workshop, we introduced tools that help admins get services up and running. This month, we will show how you can use the Ident protocol to associate a user name with a TCP connection.more »
USB WLAN Adapters Testing USB WLAN AdaptersJan 31, 2005
Electronic gadgets keep on getting smaller,and WLAN adapters are no exception.The first USB WLAN sticks hit the stores last year.This article tells you what to look for and how to get your USB WLAN device to work.more »
Wireless Standards A Guide to the Wireless StandardsJan 31, 2005
The IEEE 802.11 standards are at the center of the wireless revolution. The wireless alphabet starts with 802.11a and extends to 802.11n. Linux Magazine helps you get your wireless spelling right.more »
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.
More embarrassment for Adobe's embattled multimedia tool
Mozilla’s script blocker add-on could be putting malware sites on the whitelist.
The Internet community officially banishes the notoriously unsafe Secure Sockets Layer protocol.