- DSL/Cable Webserver
Welcome to DSL/Cable Webserver! Here you will find all the information you need to setup and maintain your own webserver at home or office on your DSL or Cable connection. If you already have DSL or Cable modem, you already have most of the necessary equipment; all you need to do is set it up.
Run your own webserver from home on DSL or Cable!
cable client desktop dsl forwarding ftp home iis linksys network port remote router server services smtp terminal web windows
in Public bookmarks with hosting howto networking server tutorials webserver by 5 users
- imeem connects people
imeem takes its name from “meme” – a term coined by Richard Dawkins to describe the ideas that communities adopt and express. Meems are spaces within imeem that you get to design and that others can join. Enter the imeem universe, where anything is possible and you are free to create. When you get started with imeem, you will be able to create meems around any topic of interest.
ImeemOfficial さんのMySpace公式プロフィール - フレンドになって情報交換しよう!
myspace sns
in Public bookmarks with community imeem networking p2p sharing social socialnetworking software by 4 users
- Shoreline Firewall
The Shoreline Firewall, more commonly known as "Shorewall", is a high-level tool for configuring Netfilter. You describe your firewall/gateway requirements using entries in a set of configuration files. Shorewall reads those configuration files and with the help of the iptables utility, Shorewall configures Netfilter to match your requirements. Shorewall can be used on a dedicated firewall system, a multi-function gateway/router/server or on a standalone GNU/Linux system. Shorewall does not use Netfilter's ipchains compatibility mode and can thus take advantage of Netfilter's connection state tracking capabilities.
in Public bookmarks with firewall iptables linux network networking security server software tools by 3 users
- Snort
Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Snort uses a flexible rules language to describe traffic that it should collect or pass, as well as a detection engine that utilizes a modular plugin architecture. Snort has a real-time alerting capability as well, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages to Windows clients using Samba's smbclient. Snort has three pr
in Public bookmarks with network networking opensource security software tools by 23 users
- TheTechGuide Forum -> Networking 2 windows xp
I restored my host computer and now I cannot get to folders in "My Network Places" although I can see them from both computers. The error message is \\Downstairs is not accessible. You might not have permission to use this network resource. Contact the administrator of this server to find out if you have access permissions. The network path was not found." This error message is on both computers. The host computer is a Windows XP Home operating system and the second computer is a Windows XP Professional operating system. The 2nd computer is named downstairs and the 1st (host) computer is named upstairs. I get the same error message on both computers; that is, the downstairs computer says "\\Upstairs is not accessible...... I am the administrator a
I restored my host computer and now I cannot get to folders in "My Network Places" although I can see them from both computers. The error m...
although both cannot computer computers erro folders from get host network networking now places restored see the them windows
in Public bookmarks with help network networking xp
- Welcome to DenyHosts
DenyHosts is a script intended to be run by Linux system administrators to help thwart ssh server attacks. If you've ever looked at your ssh log (/var/log/secure on Redhat, /var/log/auth.log on Mandrake, etc...) you may be alarmed to see how many hackers attempted to gain access to your server. Hopefully, none of them were successful (but then again, how would you know?). Wouldn't it be better to automatically prevent that attacker from continuing to gain entry into your system?
in Public bookmarks with linux network networking security software ssh tools by 4 users
networking from all users