finds you similar websites
auto-suggest    top sites

May 14th, 2024

10 Popular Sites Like http://blogs.digium.com/2...

Our team has rummaged through the internet and came across tons of excellent asterisk and security sites like this one. So come and discover other websites that are similar to this one.

Displaying 491 to 500 of 500 alternatives to http://blogs.digium.com/2009/03/28/.... (Updated: May 14th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like :
  Seven Steps to Better SIP Security with Aster...
No information avaiable
http://blogs.digium.com/2009/03/28/sip-security/
popularity:
asterisk
security
sip
voip
linux
new search by a custom tag signature
  Hack From A Cave
This version has a bunch of new stuff all around. One major addition ... wish to customize Katana by installing more Live Operating Systems, like Samurai, Pentoo, ...
similarity:
popularity:
security
tools
hacking
hack
livecd
linux
blog
hacker
sysadmin
seguridad
  Ubuntu’s Encrypted Home Directory: A Canonical Approach to Data Privacy | Linux Magazine
No information avaiable
similarity:
popularity:
ubuntu
encryption
security
howto
linux
privacy
admin
ecryptfs
software
filesystem
  Flashphone
No information avaiable
similarity:
popularity:
phone
voip
free
sip
web
telefone
flash
tools
  pam_usbng [Linux USB Authentication]
A simple and quick step-by-step guide to getting started in a few minutes ... If you are a developer or like to contribute otherwise, this is your section ...
similarity:
popularity:
security
usb
linux
pam
authentication
tools
sysadmin
free
  Network Security Toolkit
This bootable ISO live CD/DVD is based on Fedora. ... The main intent of developing this toolkit was to provide the network security ...
similarity:
popularity:
security
linux
livecd
network
opensource
tools
distribution
os
software
networking
  The SNOW Home Page
And if the built-in encryption is used, the message cannot be read even if it is ... Locating trailing whitespace in text is like finding a polar bear in ...
similarity:
popularity:
steganography
security
software
encryption
cryptography
text
tools
linux
crypto
steg
  blog gnist org - Blog
Lars Strand. Blog. Directory. Login. New User. Welcome to ... gnist.org. gnist.org/~lars. Topics. Home. Security (10/0) Tech (20/0) Private (1/0) Older Stories ...
similarity:
popularity:
security
linux
blog
hacking
networking
sysadmin
homebrew
nintendo
unix
tips
  Securing Your Server: Setting up a Linux Firewall Using IPTables and Webmin - RimuHosting
I am really pleased to find somebody who really knows about java development, ... other shops just offer out of the box stuff and cant really help you much beyond ...
similarity:
popularity:
linux
firewall
security
iptables
webmin
sysadmin
howto
tutorial
rimuhosting
admin
  Shellter
If you're looking for Evolution on Win32, go to http://shellter.sourceforge.net/evolution. ... ShellTer is an iptables-based firewall. ...
similarity:
popularity:
firewall
security
linux
iptables
ssh
shellter
< prev 1 ... 48 49 50
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.