About 63 results
-
Using Snort for intrusion detection
Need a simple-to-use yet highly flexible intrusion detection package? If so, look no further than Snort. This Linux utility might be just what you need for network traffic monitori...
-
Using DNS Lookup with Windows
DNS information? We don't need no stinking DNS information! Well, actually you do. And two very simple tools that will help you get that information are explained right here and n...
-
Example B
Being able to interpret Linux log files is a tricky game of guess the syntax. Fortunately, there is some method to that madness, and Jim McIntyre is here to make it all seem simple...
-
Using Cryptographic Filesystem with Linux
Employing cryptography is quickly becoming key in the IT industry. Although transferring large encrypted files can be a difficult task, the Cryptographic Filesystem makes this proc...
-
Using the find command
All operating systems have their own methods of searching for files. Linux is no stranger to this concept. In fact, in Linux, the find command comes in quite handy. Read on as Jim ...
-
Using variable-length subnetting with TCP/IP networks
How many times have you simply needed more subnetworks on your Class C environment? If you have this need, you should let Jim McIntyre show you the way of variable-length subnettin...
-
Supernetting Class C networks
If you have more than one Class C network and you need more hosts, you might want to try to supernet your Class C networks to create one large network. In this Daily Feature, Jim M...
-
Configuring Linux sound services with ALSA
Getting sound configured in Linux can be a nightmare. Rescue is on the way in the form of Advanced Linux Sound Architecture (ALSA). Jim McIntyre is here to walk you through install...
-
Using the Border Gateway Protocol
The Border Gateway Protocol enables you to provide routing services between autonomous systems. Jim McIntyre takes an introductory look at the protocol and its message types.
-
Build Your Skills: Subnetting and supernetting IP networks
Covers procedures involved in subnetting Class A, B, and C networks, as well as those involved in supernetting Class C networks