Big Brother
8 steps to a working Linux Intrusion Detection System (SHADOW)
Ethereal filters
Port Numbers Listing
* Securing email with procmail
SuEXEC
SuPHP
Tripwire
Unix security Checklist