Apparmor - How to use it
Where to start when building an apparmor profile for an application.
The Linux Audit System, or Who Changed That File?
How to properly set up and use the Linux Audit System to find out who modified some file.
Some simple ways of getting information about a running process.
GCC compiler benchmarks
Performance comparison of GCC versions ranging from 3.3.6 to 4.6.0. Also includes results for LLVM (upto 3.0).
Running firefox (on Linux) as a different (unprivileged) user
This article is intended to give a short but concise howto for running firefox (or any other graphical application) under a different (nonprivileged) user.
Securing a VPS or dedicated server
Everybody writes about proactive security, thus this article focuses on something different: "intrusion resistance", i.e. the ability to confine an intrusion and limit the potential damage.
Intrusion detection: unprivileged intruders
Suggestions for detecting intruders hiding under the identity of legitimate shell users.
Defending against brute force ssh attacks
An overview of different methods (and their respective trade-offs)for dealing with the problem.
A comparison of file integrity
This comparison focuses on technical performance — in particular in corner cases which are likely to reveal problems —, rather than simply listing and comparing features.
A paper describing different ways of subverting the Linux kernel, and methods for detection of kernel rootkits.
Detecting a sniffer
on an IPV6-enabled Linux system
What works, and what doesn't.
List of PGP
(with response times)
Internet services on
How to determine what internet services are running on your machine, and how to switch them off
Helps you to hide your email address from spambots that harvest addresses from websites.
Beginners tutorial / howto / guide on compiling applications from source.