09 June 2010
Deep-protocol analysis of UNIX networks
Some UNIX protocols need investigation to understand what they are doing and what information they are exchanging. In this article, we will take a look at techniques for performing detailed analysis of the protocols in use on your UNIX network.
26 May 2010
The best-kept secrets of UNIX power users
You don't have to break into a Watergate office to uncover the secrets of UNIX power users. There's an informant, and he's spilling the beans. Learn why Environment Variables, the dot file, and the Secure Shell (SSH)are very important.
1
(2 marks)