finds you similar websites
auto-suggest    top sites

Jun 15th, 2025

12 Popular Sites Like http://www.ranum.com/secu...

Our team has explored the web and uncovered tons of superb security and howto sites like this one. So come and discover other sites that are similar to this one.

Displaying 21 to 30 of 500 alternatives to http://www.ranum.com/security/compu.... (Updated: Jun 15th, 2025)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like :
  artificial ignorance: how-to guide
No information avaiable
http://www.ranum.com/security/computer_security/papers/ai/index.html
popularity:
security
howto
logging
unix
linux
sysadmin
tutorial
network
programming
monitoring
new search by a custom tag signature
  Secure Programming for Linux and Unix HOWTO
This book provides a set of design and implementation guidelines for writing ... Such programs include application programs used as viewers of remote data, web ...
similarity:
popularity:
security
programming
linux
unix
c
howto
secure
development
c++
c\/c++
  nixCraft: Linux Tips, Hacks, Tutorials, And Ideas In Blog Format
Offers Linux tips, hacks, news, tutorials, and ideas in blog format.
similarity:
popularity:
linux
howto
unix
tutorial
sysadmin
tips
blog
reference
tutorials
admin
  HowtoForge - Linux Howtos and Tutorials | The Open Source Howto Development Web Site.
HowtoForge provides user-friendly Linux tutorials about almost every topic. ... Do you like HowtoForge? Please consider to support us by becoming a subscriber. ...
similarity:
popularity:
linux
howto
tutorial
tutorials
reference
opensource
unix
software
ubuntu
tips
  chkrootkit -- locally checks for signs of a rootkit
chkrootkit locally checks for signs of a rootkit. Includes ifpromisc.c to check if the interface is in promiscuous mode, chklastlog.c and chkwtmp.c to check for ...
similarity:
popularity:
security
linux
rootkit
tools
software
sysadmin
unix
opensource
tool
hacking
  Welcome to DenyHosts
Denyhosts now has over 70,000 users contributing synchronization data and ... You can Download the latest version of DenyHosts or view the Changelog. ...
similarity:
popularity:
security
ssh
linux
sysadmin
tools
software
networking
unix
server
python
  Insecure.Org - Nmap Free Security Scanner, Tools & Hacking resources
Security tools, exploits, reading, and links from Fyodor.
similarity:
popularity:
security
hacking
tools
network
software
nmap
sysadmin
internet
linux
networking
  Snort - the de facto standard for intrusion detection/prevention
Download for Snort, an open source network intrusion prevention and detection ... Click the rules button for more information on the rulesets available on Snort.org ...
similarity:
popularity:
security
network
opensource
software
linux
tools
ids
snort
networking
sysadmin
  Welcome to the Home of OSSEC
OSSEC - Open Source Security, Host-Based Intrusion Detection System ... Welcome to the Home of OSSEC. OSSEC is an Open Source Host-based Intrusion Detection System. ...
similarity:
popularity:
security
ids
linux
opensource
sysadmin
software
tools
windows
hids
unix
  Nessus
Free, open-source vulnerability and remote security scanner.
similarity:
popularity:
security
network
software
tools
scanner
linux
opensource
networking
vulnerability
sysadmin
  OpenSSH Public Key Authentication
Secure Shell (SSH) public key authentication can be used by a client to access ... Password free logins benefit remote access and automation, for example if ...
similarity:
popularity:
ssh
security
howto
authentication
linux
openssh
key
sysadmin
tutorial
unix
< prev ... 1 2 3 4 5 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.