Advanced search


Cloudy Outlook  

Is your data really secure in the cloud? If a compromise occurs, current forensic approaches will not work and new techniques and standards will be needed.

Detention  

Most clients on a network need both an address and some environmental information such as a name server or a web proxy. This article investigates whether a recent operating system on an IPv6-only LAN can handle this.

No Magic Needed  

Simple VPNs might not provide enough security alone; instead, try a carefully crafted mix of OpenVPN and Aladdin e-tokens.

ReconTime  

Professional attackers have much more pointed at your site than just Nmap, and you should too if you want to test your network's security. We'll show you some tools intruders use to gather information.

Made to Measure  

We look at two tools for Windows network monitoring – PRTG Network Monitor and NetCrunch – that allow you to monitor servers at work or on the road.

Rendezvous  

Any implementation of the standard-based IPsec is supposed to work with any other implementation – but sometimes you need a little extra effort. This article tests some IPsec implementations to see how well they fit.

Players  

We take an in-depth look at three important scripting players: grep, awk, and sed.

The Future of Nagios  

Ethan Galstad visited Sao Paulo Brazil in April for the Nagios Latin America Conference. In his first visit to the country and Latin America, Ethan gave an exclusive interview to our the Linux Magazine Brazilian edition and told us a bit about the history of Nagios – perhaps one of the most successful stories in open source network software.