ISSUE 1.4 (October 2005)
The covered topics are:
- Structured traffic analysis
- Access Control Lists in Tiger and Tiger Server - true permission management
- Automating I.T. security audits
- Biometric security
- PDA attacks, part 2: airborne viruses - evolution of the latest threats
- Build a custom firewall computer
- Lock down your kernel with grsecurity
- Interview with Sergey Ryzhikov, director of Bitrix
- Best practices for database encryption solutions