About 63 results

  • Jim McIntyre // August 22, 2001, 12:00 AM PST

    Using Snort for intrusion detection

    Need a simple-to-use yet highly flexible intrusion detection package? If so, look no further than Snort. This Linux utility might be just what you need for network traffic monitori...

  • Jim McIntyre // August 22, 2001, 12:00 AM PST

    Using DNS Lookup with Windows

    DNS information? We don't need no stinking DNS information! Well, actually you do. And two very simple tools that will help you get that information are explained right here and n...

  • Jim McIntyre // July 11, 2001, 12:00 AM PST

    Example B

    Being able to interpret Linux log files is a tricky game of guess the syntax. Fortunately, there is some method to that madness, and Jim McIntyre is here to make it all seem simple...

  • Jim McIntyre // June 27, 2001, 12:00 AM PST

    Using Cryptographic Filesystem with Linux

    Employing cryptography is quickly becoming key in the IT industry. Although transferring large encrypted files can be a difficult task, the Cryptographic Filesystem makes this proc...

  • Jim McIntyre // June 20, 2001, 12:00 AM PST

    Using the find command

    All operating systems have their own methods of searching for files. Linux is no stranger to this concept. In fact, in Linux, the find command comes in quite handy. Read on as Jim ...

  • Jim McIntyre // June 11, 2001, 12:00 AM PST

    Using variable-length subnetting with TCP/IP networks

    How many times have you simply needed more subnetworks on your Class C environment? If you have this need, you should let Jim McIntyre show you the way of variable-length subnettin...

  • Jim McIntyre // May 7, 2001, 12:00 AM PST

    Supernetting Class C networks

    If you have more than one Class C network and you need more hosts, you might want to try to supernet your Class C networks to create one large network. In this Daily Feature, Jim M...

  • Jim McIntyre // April 4, 2001, 12:00 AM PST

    Configuring Linux sound services with ALSA

    Getting sound configured in Linux can be a nightmare. Rescue is on the way in the form of Advanced Linux Sound Architecture (ALSA). Jim McIntyre is here to walk you through install...

  • Jim McIntyre // March 26, 2001, 12:00 AM PST

    Using the Border Gateway Protocol

    The Border Gateway Protocol enables you to provide routing services between autonomous systems. Jim McIntyre takes an introductory look at the protocol and its message types.

  • Jim McIntyre // March 22, 2001, 12:00 AM PST

    Build Your Skills: Subnetting and supernetting IP networks

    Covers procedures involved in subnetting Class A, B, and C networks, as well as those involved in supernetting Class C networks