Version 2.0.0 of the GnuTLS security database improves access to X.509 certificates and adds RSA with SHA-256/384/512 certificates to the crop of supported crypto approaches.more »
CD Encryption Burning CDs and DVDS with an encrypted filesystemOct 31, 2006
An encrypted hard disk on your server is no help if valuable data on CDs or DVDs falls into the hands of spies. We’ll show you some convenient solutions for encrypting data on removable media.more »
Crypto Tricks Intro Disk-level cryptography in LinuxOct 31, 2006
Today’s computers are fast enough for some very sophisticated cryptography techniques. We’ll show you how to keep your data safe from the prying eyes of snoops and spies.more »
Encrypted Filesystems Shopping for an encrypted filesystemOct 31, 2006
If you’re not a security expert and you're looking for a crypto filesystem, you may be wondering about the alternatives. We took at a look at some popular crypto options for Linux.more »
DM-Crypt/ LUKS Workshop: Encrypting hard disks with DM-Crypt and LUKSOct 31, 2006
Encrypting a home directory is easy. Encrypting your whole hard disk – including the root filesystem – takes a little more effort.more »
Anubis Centralized email encryption with AnubisJan 31, 2006
The Anubis mail manipulation daemon lets you centralize encryption for outgoing mail.more »
DM-Crypt Hard disk encryption with DM-Crypt, LUKS, and cryptsetupNov 30, 2005
If you’re serious about keeping secrets, try hard disk encryption with DM-Crypt and LUKS.more »
Thunderbird Security Secure email with Thunderbird and EnigmailJun 30, 2005
Thunderbird offers several options for secure email, and the GnuPG-based Enigmail encryption add-on provides an additional layer of protection.more »
New release marks the arrival of AMD’s unified driver strategy.
A new study by IDC charts big changes in the big hardware market.
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?