dcsimg

Articles by Carla Schroder 

OpenSSH Speed Tips and Tricks

Transferring SSH identity keys can be a royal pain. Fortunately, ssh-copy-id, a slick utility included with OpenSSH, simplifies the process.

Security 101: E-mail Encryption with PGP and GPG

PGP and GPG ensure e-mail stays between the sender and its intended recipient.

Tip of the Trade: E-mail Encryption

PGP and GPG ensure e-mail stays between the sender and its intended recipient.

Graceful UPS Shutdowns on Linux

There's nothing pleasant about the data corruption or even hardware damage that can result from a power failure. Carla Schroder explores how UPS units and a couple of Linux UPS tools can help safeguard your mission-critical computers.

Making Outlook Less Insecure

If, even after the recent SoBig and Blaster attacks, your users insist on running Outlook or Outlook Express, Carla Schroder feels your pain. For the sake of your sanity, here's a list of tips and tricks you can implement to counter the mail client's 'Swiss cheese' approach to security.

Spam and Viruses: Unholy Matrimony, Part 2

Make no mistake about it -- spam and viruses are deliberate, malicious assaults on our systems that often work together to penetrate and compromise our networks. In the second article of a two-part series, Carla Schroder takes a look at client-side defenses for defeating the two-headed monster.

Spam and Viruses: Unholy Matrimony, Part 1

Make no mistake about it -- spam and viruses are deliberate, malicious assaults on our systems that often work together to penetrate and compromise our networks. Carla Schroder's new series takes a look at server-level and client-side defenses for defeating the two-headed monster.

Building Firewalls with iptables, Part 2

Exposing any system, no matter how briefly, to an untrusted network is suicidal. A firewall is absolutely vital, and fortunately, the Linux world offers an excellent free firewall utility in netfilter/iptables. Carla Schroder takes a deeper look at iptables with additional rules and scripts for basic firewalling and sharing Internet connections.

Building Firewalls with iptables, Part 1

Exposing any system, no matter how briefly, to an untrusted network is suicidal. A firewall is absolutely vital, and fortunately, the Linux world offers us an excellent free firewall utility in netfilter/iptables.

Viva Liberacion: A Guide to Nuking Spammers, Part 1

All the Bayesian filters, Perl scripts, blocklists, and hosting services do nothing to actually stop spam from proliferating; they merely prevent some of it from reaching your inbox. Carla Schroder's new two-part series takes a look at fighting spam from a different perspective -- cutting it off at the source.

Realtime Black-hole Lists: Heroic Spam Fighters or Crazed Vigilantes?

In the continually escalating and increasingly frustrating battle against spam, email administrators are resorting to increasingly draconian measures. Carla Schroder reports on one such measure, the use of Realtime Black-hole Lists (RBLs) to head off spam before it ever reaches your mailserver.

Security: Batten Down the Hatches and Troll for Gotchas

Between telnet and Google, there's a lot you can learn about just how secure your organization's systems are. Carla Schroder covers some obscure gotchas you might want to fix, or at least show to your boss.