The Massachusetts Institute of Technology (MIT) has founded the Kerberos Consortium with the aim of enhancing the Kerberos authentication protocol to provide a universal authentication method on open networks.more »
SerNet claimed the protocol specifications from Microsoft in order to enhance the open source software and make it interoperable.more »
Version 6.0 of the Bittorrent filesharing client will no longer be Open Source and it is currently available for Windows only.more »
Safer Surfing Staying ahead of Internet snoopers and con menMay 31, 2006
Do you know enough to surf free of the liars and spies? We’ll show you how to stay ahead of the traps.more »
Tor and Privoxy Anonymous surfing with Tor and PrivoxyMay 31, 2006
Internet users typically reveal their IP addresses, and this lets companies compile a profile of your Internet activities. Tor and Privoxy can help protect your privacy.more »
Netfilter L7 Blocking protocols at Layer 7 with the L7 patchFeb 28, 2006
If you need a tool for filtering protocols that doesn’t depend on the port, try L7, an IPTables patch that operates through regular expressions.more »
Admin Workshop: NTP Insider Tips: Network Time ProtocolOct 31, 2005
Networks often require very accurate timekeeping. The Network Time Protocol provides the time with precision.more »
New partnership will bring more and better CS training to US schools
Criminals offer online help over Tor network
Sophisticated malware is still present on Joomla and WordPress sites around the world.
Future versions of Ubuntu's code service will support the popular Git version control system used with Linux and other open source projects.
New release marks the arrival of AMD’s unified driver strategy.
A new study by IDC charts big changes in the big hardware market.
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.