finds you similar websites
auto-suggest    top sites

Jun 15th, 2025

12 Popular Sites Like http://www.ranum.com/secu...

Our team has explored the web and uncovered tons of superb security and howto sites like this one. So come and discover other sites that are similar to this one.

Displaying 31 to 40 of 500 alternatives to http://www.ranum.com/security/compu.... (Updated: Jun 15th, 2025)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like :
  artificial ignorance: how-to guide
No information avaiable
http://www.ranum.com/security/computer_security/papers/ai/index.html
popularity:
security
howto
logging
unix
linux
sysadmin
tutorial
network
programming
monitoring
new search by a custom tag signature
  Damn Vulnerable Linux - The most vulnerable and exploitable operating system ever - DVL Overview
Damn Vulnerable Linux - The most vulnerable and exploitable operating system ever! ... Get certified with our 4-Steps-Certification process! ...
similarity:
popularity:
linux
security
hacking
distro
exploits
opensource
learning
howto
livecd
tutorial
  Firewall and Proxy Server HOWTO
No information avaiable
similarity:
popularity:
linux
firewall
security
proxy
howto
networking
network
server
unix
tutorial
  Secure Programming for Linux and Unix HOWTO
No information avaiable
similarity:
popularity:
security
programming
linux
unix
c
web
japanese
howto
php
python
  TECH SOURCE FROM BOHOL: 10 Best Hacking and Security Software Tools for Linux
Hacks, News, Tutorials, Reviews about Linux, Open Source, Ubuntu, Google, Apple, Microsoft, Programming, Gadgets, and everything related to Digital Technology.
similarity:
popularity:
linux
security
tools
hacking
software
unix
sysadmin
hack
utilities
ubuntu
  Quick HOWTO : Ch14 : Linux Firewalls Using iptables - Linux Home Networking
The data center section outlines the rationale for either hosting your website ... It also covers how to migrate your existing servers from one data center to ...
similarity:
popularity:
iptables
linux
firewall
security
howto
sysadmin
networking
reference
network
tutorial
  An Illustrated Guide to SSH Agent Forwarding
Unixwiz.net Tech Tip: Secure Linux/UNIX access with PuTTY and OpenSSH ... Unixwiz.net Tech Tip: Building and configuring OpenSSH ...
similarity:
popularity:
ssh
security
howto
linux
unix
reference
tutorial
networking
agent
forwarding
  grsecurity
grsecurity is an innovative approach to security utilizing a multi-layered ... It is licensed under the GPL. It offers among many other features: ...
similarity:
popularity:
security
linux
kernel
software
sysadmin
grsecurity
opensource
rbac
server
unix
  eth0.us - General info for cPanel, plesk, ensim, and linux! | .
Total Server Solutions - for all your server admin needs! ... www.eth0.us. Submit search form. User login. Username: * Password: * Create new account ...
similarity:
popularity:
linux
security
cpanel
server
howto
hosting
tutorials
sysadmin
tutorial
plesk
  Linux permissions
No information avaiable
similarity:
popularity:
linux
permissions
security
tutorial
unix
sysadmin
file
ubuntu
howto
chmod
  Samhain Labs | Defending against brute force ssh attacks
No information avaiable
similarity:
popularity:
ssh
security
linux
iptables
sysadmin
howto
firewall
network
defend
reference
< prev ... 1 2 3 4 5 6 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.