Security
Security is the condition of being protected against danger or loss.
Article

Avoiding Cloud computting DoS attacks

Look in detail at how the HybridCloud application authenticates itself to cloud services, how Google Apps uses OAuth and how Force.com cloud services require built-in testing to avoid inadvertent...
Article

The key components of Multi-security based solutions for UNIX

This article discusses the risk associated with the use of the same security mechanism in multifactor authentication systems and proposes the use of GSS-API as a suitable option for achieving the...
Article

Designing a Linux PAM login security application

The Pluggable Authentication Module (PAM) API exposes a set of functions that application programmers use for security-related functions like user authentication, data encryption, LDAP, and more. In...
Article

SELinux and Smack security modules for Linux containers

A common response when someone first hears about containers is "How do I create a secure container?" This article answers that question by showing you how to use Linux Security Modules (LSM) to...
Article

Synchronizing UNIX files with optimized security

There are many tools available that allow you to synchronize files across UNIX directories, but doing it effectively, and securely, takes a little bit more effort. This article looks at solutions for...
Article

Improve Security with Linux PAM

Linux Pluggable Authentication Module (PAM) can help you protect world-writeable shared directories from abuse. This article for Linux system administrators lays out the steps to enable namespaces...
Article

Deploy Customized Security Plug-Ins in DB2 9

Security plug-ins bring new versatility to your database security setup in IBM DB2 9. Read this article to determine what should be tested before deploying your own customized security plug-ins....
Article

LPI Exam 202: System security

Prepare for the Linux certification exams and build fundamental skills on Linux systems administration. This tutorial, the sixth in a series of seven on LPIC-2 exam 202 topics shows you how to...
Article

LPI Exam 202: Network Client Management

Learn to configure DHCP, NIS, LDAP servers, and PAM to support authentication to prepare you for the LPIC-2. This tutorial series serves as a comprehensive study guide so you can take the exams with...
Article

Assess system security using a Linux LiveCD

Want to assess security vulnerabilities on your Linux system without lengthy installation and configuration efforts? We introduce four packages -- Auditor, Whoppix, Knoppix-STD, and PHLAK -- that...
Article

Inotify Replacing Dnotify in the 2.6 Kernel

Inotify is a file system event-monitoring mechanism slated for inclusion in upcoming Linux kernels that is designed to serve as an effective replacement for dnotify, which was the de facto...
Article

Back Up My Linux

The loss of critical data can prove devastating. Still, millions of professionals ignore backing up their data. While individual reasons vary, one of the most common explanations is that...
Article

Windows-to-Linux roadmap: Pt 8:Backup and recovery

IBM e-business architect Chris Walden is your guide through a nine-part developerWorks series on moving your operational skills from a Windows to a Linux environment. In this part, we take stock of...
Article

Windows-to-Linux roadmap: Part 5. Linux logging

IBM e-business architect Chris Walden is your guide through a nine-part developerWorks series on moving your operational skills from a Windows to a Linux environment. In this part, we track,...
Article

Developing secure programs

This column explains how to write secure applications; it focuses on the Linux operating system, but many of the principles apply to any system. In today's networked world, software developers must...
Article

Uncovering the secrets of SE Linux: Part 1

In an uncharacteristic move, the U.S. National Security Agency recently released a security-enhanced version of Linux -- code and all -- to the open source community. This dW-exclusive article takes...
1 2  Next
 

Recent Jobs

Official Programmer's Heaven Blogs
Web Hosting | Browser and Social Games | Gadgets

Popular resources on Programmersheaven.com
Assembly | Basic | C | C# | C++ | Delphi | Flash | Java | JavaScript | Pascal | Perl | PHP | Python | Ruby | Visual Basic
© Copyright 2011 Programmersheaven.com - All rights reserved.
Reproduction in whole or in part, in any form or medium without express written permission is prohibited.
Violators of this policy may be subject to legal action. Please read our Terms Of Use and Privacy Statement for more information.
Operated by CommunityHeaven, a BootstrapLabs company.