OpenNMS OpenNMS: Monitoring large systems and networksMar 30, 2011
If you need to monitor very large networks, you need powerful software. OpenNMS offers serious monitoring capabilities in a truly open source package.more »
Security Lessons Linux security in the cloudMar 28, 2011
Although you give up control of the underlying infrastructure when you use cloud computing, you can still maintain some control over security.more »
Intrusion Detection Platform-independent and extensible IDS with PreludeMar 23, 2011
The Prelude security information management system receives both host- and network-based IDS messages and displays them in an easy web interface. We show you how to set it up.more »
Security Lessons: Secure Video Secure Video SurveillanceMar 01, 2011
Unless your surveillance cameras are wired directly to a video board, they are notoriously insecure. We show you how to keep your cameras from being compromised.more »
The Institute for Security and Open Methodologies (ISECOM) announced the released of the Open Source Security Testing Methodology Manual (OSSTMM) 3.0.more »
Caine The Caine 2.0 forensic distributionNov 29, 2010
Caine is a Linux distribution based on Ubuntu 10.04 for forensic scientists and security-conscious administrators. Poised to do battle against IT ne’er-do-wells, Caine has a comprehensive selection of software, a user-friendly GUI, and responsive support.more »
The 2010 security report looks at more than 291 projects, with special focus on the Android 2.6.32 kernelmore »
Security Lessons Plugin VulnerabilitiesOct 27, 2010
Plugins provide a lot of functionality but, depending on their quality, they can provide unwanted security issues as well. We show you how to protect yourself from plugins.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.