A Guide to OpenBSD Custom Kernel Compilation
Note: This article first appeared over at http://www.openbsddiary.org and has been republished here with permission from the author.
By:Deekayen
Note: This article first appeared over at http://www.openbsddiary.org and has been republished here with permission from the author.
By:Deekayen
By: biatch0
Before you read the rest
of this, please be notified that this is a walk down memory lane of sorts for
me, not to mention somewhere that I poured out whatever little there is in that
twisted mind of mine. It is a long article. Moving on now.
By: orange
This text is just a simple viewpoint on securing an internal network for today's increasingly hostile digital world.
We will cover simulated levels of an internal network from the following hierarchy (lowest to highest):
Desktop PCs
It's certainly been a long month. We've had our fair share of network interruptions (full credit for this goes to the superb network kung-fu skills of TMNet, our top level provider), power cuts, and overall headaches, but thankfully the zine hasn't been delayed :). We originally had 10 articles in the line up, however three contributors couldn't make the deadline, so I had to go with 6. I'm sure you'll enjoy the read all the same.
By: L33tdawg
By: Octet
Contents:
1.) Intro
2.) Routers/routing
3.) Switches,hubs.
4.) The beauty of the insecure bus topology.
Basic text to hacking/manipulating routers,how switches and hubs work and some other shit composed by octet. I just figured that I haven`t anything to do so why not write this text?
To keep kiddies and whatever form of idiots that may read this text clueless i`m not describing (a) what a router is (b) what a router does and (c) how to identify a router.Note: I never mentioned "how a router routes"
By:Dinesh Nair
This article first appeared over at our affiliates site Alphaque.com. The original piece can be found here
By: madirish
The following simple 7 steps are ones you can take to easily enhance the overall security of your Windows 2000 Server. These are quick and dirty steps to enhance your security and can be used in addition to any third party security tools and firewalls you may have already implemented.
By: Manic Velocity
manicvelocity@crapmail.com