Coworkers at the University of Tel Aviv have presented a prototype for a new host-based intrusion detection system (HIDS) for Linux. Named Korset, it uses static code analysis and promises zero failures.more »
According to a report from Reuters, trading at the London Stock Exchange came to a standstill for seven hours because of computer problems on Monday.more »
Trackbacks in Drupal Configuring Trackbacks in DrupalSep 01, 2008
Trackbacks offer a simple means for bloggers to connect and share information.more »
RadialNet Visualizing your network with RadialNetSep 01, 2008
RadialNet draws a picture of the network, helping admins identify potential security holes.more »
Google's software for mobile communication, Android, is scheduled for release in November along with the Dream ''GPhone."more »
TorK Configuring the Tor network with TorKAug 01, 2008
If you're worried about eavesdroppers, connect to the Tor network with KDE's handy TorK configuration tool.more »
Tuning WLAN Routers Customizing your home router with OpenWrtAug 01, 2008
Learn how to take control of your home routing device with OpenWrt.more »
Charly's Column The Sysadmin’s Daily Grind: PostfilterJul 11, 2008
If protocols were human beings, NNTP would be a kind and slightly confused person that always believes the best of other people – even if they drop trash in the mailbox. Postfilter gives NNTP a watchdog.more »
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.