Snort Intrusion Detection with the Snort IDSNov 01, 2008
Search out hidden attacks with the Snort intrusion detection system.more »
Ed Schaefer reviews the newest edition of Hacking: The Art of Exploitation.more »
Coworkers at the University of Tel Aviv have presented a prototype for a new host-based intrusion detection system (HIDS) for Linux. Named Korset, it uses static code analysis and promises zero failures.more »
Tracing Intruders Intro Examining the art of computer forensicsAug 01, 2008
You don't need expensive proprietary tools to practice the craft of computer forensics.more »
Investigating Windows Systems Investigating Windows systems with LinuxAug 01, 2008
A forensics expert explains how to extract interesting details from a confiscated Windows hard disk using standard Linux tools.more »
BackTrack and Sleuth Kit Forensics with BackTrack and Sleuth KitAug 01, 2008
Once you determine a system has been attacked, boot to the BackTrack Live forensics distro and start your investigation with Sleuth Kit.more »
Expert Security Intro Staying one step ahead of the intrudersJun 01, 2008
Internet intruders have many ingenious ways of escalating privileges and hiding their presence once they get inside your system. The best protection is to keep them out in the cold.more »
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.