Full release of BackTrack Linux 5 R2 is now available.more »
Charly’s Column: w3af The sys admin’s daily grind: w3afMar 02, 2012
After toiling away to create a small but exclusive website, Charly wanted to run a security scanner against it to check for vulnerabilities. The choice of tools is enormous, but Charly chose w3af.more »
Charly’s Column: PortSentry The sys admin’s daily grind: PortSentryFeb 02, 2012
To celebrate 10 years of his column, Charly sets up a sensitive detector that measures the cosmic background radiation of the Internet.more »
The Anonymous Hacktivist group has been in many headlines this past year. Who are they? What did they attack? How do they communicate?more »
The Wireshark free network sniffer rolls out 1.6 release with advanced features.more »
BackTrack, an Ubuntu-based penetration-testing distribution, offers "major improvements" over previous releases, including support for 32- and 64-bit architectures, KDE 4, Gnome, and Fluxbox.more »
Snort Helpers Snort Helpers: Open Source Network Intrusion DetectionMay 02, 2011
Snort is the de facto standard for open source network intrusion detection. The developer community has kept a fairly low profile for a couple of years, but extensions like Snorby, OpenFPC, and Pulled Pork have given the old hog a new lease on life.more »
Red Hat announces IBM, Accenture, Alfresco, Cisco, HP and Intel representatives are scheduled to deliver keynotes at the seventh annual Red Hat Summit and JBoss World, May 3-6, 2011 in Boston, Massachusetts.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.