- OSI accepting individual memberships.
- OpenGL 4.3 and ES 3.0.
- License Protection
- Raspberry Pi ramps up production.
- FSFE protects licences when bankruptcy strikes.
- Gaming passwords secured with My1login.
- Web Apps new to Ubuntu.
- LPI Forum
- RSA Anti Rogue App.
- US Cell Phone Right-to-Know Act.
IPv6 Pen Testing Pen testing on IPv6 networksAug 23, 2012
If you have enabled IPv6 on your network without considering basic security issues, you might have opened up a hole for attackers. In this article, we demonstrate a successful attack on a server via IPv6 and explain how the popular security tools handle IPv6.more »
Password Tools Creating secure passwords and testing their qualityAug 23, 2012
Create secure passwords with the help of a password generator and check for quality at the same time.more »
OpenSSL with Bash Using the OpenSSL toolkit with BashAug 23, 2012
Cryptography is an important part of IT security, and OpenSSL is a well-known cryptography toolkit for Linux. Experts depend on OpenSSL because it is free, it has huge capabilities, and it’s easy to use in Bash scripts.more »
Surveillance with NAS Network-attached storage keeps an eye on your stuffAug 23, 2012
Take advantage of the low watt per operation compute power offered by modern NAS to monitor your cameras.more »
Table of Contents: 143 Intrusion PreventionAug 23, 2012
New vulnerabilities appear every day. To keep your network safe, you need to think like an attacker.more »
Table of Contents: 142 Going VirtualJul 24, 2012
Your virtualization options continue to expand. This month, we look at two popular solutions. First, we show you how to map your virtual disks to optimize your KVM installation. Then, we examine the ins and outs of virtualization with VMware’s free vSphere Hypervisor 5.0.more »
Command Line: More Secure Passwords Improving account passwordsJul 24, 2012
Even with encrypted drives, account passwords remain one of the prime security methods for any Linux system. With a little knowledge of the available commands and their options, you can make your account passwords more secure.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm