LinuxSecurity Contributor - Brittany Day
Brittany Day
Brittany is a passionate, committed content creator and editor for LinuxSecurity. Brittany aims to write and promote content that provides value to everyone, regardless of their career or familiarity with Linux, raising awareness of the many advantages of Open Source. Brittany earned a BS in General Science at the University of Oregon. Aside from writing, Brittany's passions include spending time with family, bodybuilding, and gardening.
Education: BS in General Science, University of Oregon
Experience: LinuxSecurity Senior Content Editor, 2018 - present
Citizenship: USA
Articles From Brittany Day
11 - 15 min read
Flying Pigs: Snorting Next Generation Secure Remote Log Servers over TCP
28 May 2002
A Comprehensive Guide to Building Encrypted, Secure Remote Syslog-ng Servers with the Snort Intru
LinuxSecurity.com Feature Articles
7 - 10 min read
Intrusion Detection Response
21 April 2002
In this paper, Anton looks at network intrusion systems, IDS-triggered countermeasures, what are
LinuxSecurity.com Feature Articles
5 - 7 min read
Linux Data Hiding and Recovery
09 March 2002
Just when you thought your data was removed forever, Anton Chuvakin shows us how to recover data and
LinuxSecurity.com Feature Articles
8 - 11 min read
Linux 802.11b and wireless (in)security
03 March 2002
In this article, Michael talks about Linux and background on wireless security, utilities to inte
LinuxSecurity.com Feature Articles
5 - 7 min read
Building a VPN Using Yavipin
26 February 2002
Yavipin is a package that can be used to build a VPN between two hosts using some of the most advanc
LinuxSecurity.com Feature Articles
3 - 5 min read
IT Security Cookbook Now Available
24 February 2002
Over the past five years, Sean Boran has put together what has become the most comprehensive online
LinuxSecurity.com Feature Articles
18 - 24 min read
Building a Virtual Honeynet
16 February 2002
Hisham shares his experiences with building a virtual honeynet on his existing Linux box. He desc
LinuxSecurity.com Feature Articles
9 - 13 min read
Approaches to choosing the strength of your security measures
27 January 2002
Anton Chuvakin discusses the known approaches to choosing the level of security for your organizatio
LinuxSecurity.com Feature Articles
3 - 5 min read
Securing Vulnerable Software
19 January 2002
Scott Wimer, CTO Cylant Software, discusses methods for improving the security of a computer system
LinuxSecurity.com Feature Articles
8 - 12 min read
LinuxSecurity.com Reviews the Honeynet Project's Know Your Enemy Book
15 December 2001
The Honeynet Project's first book details how a honeynet works, how to analzye the data once capture
LinuxSecurity.com Book Reviews
10 - 13 min read
Oskar Andreasson IP Tables Tutorial
26 November 2001
Oskar Andreasson speaks with LinuxSecurity.com about his comprehensive IP Tables tutorial and how th
LinuxSecurity.com Feature Articles
3 - 5 min read
Hal Burgiss Introduces Linux Security Quick-Start Guides
13 November 2001
After many months of work, Hal Burgiss has finished the first version of his very thorough Linux Sec
LinuxSecurity.com Feature Articles