The Recovery Is Possible (RIP) Linux rescue system is available in its newest version 6.6. A related web forum enables discussion among developers and users.more »
"If we are going to call Nmap the 'Network Mapper', it should at least be able to draw you a map of the network! " writes developer Fyodor in announcing the newest version 4.75 of the Nmap security scanner.more »
Free blog software WordPress notifies of a security update in its 2.6.2 version.more »
Wietse Venema, the developer of Postfix, points in an advisory to a security problem in connection with the Linux and Solaris filesystems. As more recent versions of these operating systems no longer comply with the POSIX standard for links, local attackers may be able to attach files to other users' Postfix mailboxes.more »
OCFA Exploring the Open Computer Forensics ArchitectureAug 01, 2008
Automate the forensics process with the Dutch police department's Open Computer Forensics Architecture.more »
Security Lessons The Debian OpenSSL disasterAug 01, 2008
Find out what we can learn from the Debian OpenSSL disaster.more »
Mozilla has just released version 3.0.1 of the Firefox browser; the first maintenance update removes a couple of vulnerabilities and fixes a some minor bugs.more »
Argus Keeping an eye on the network with ArgusJul 11, 2008
Argus helps you monitor the flow of data on your network, detect trends, discover worms and viruses, and analyze bandwidth usage.more »
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.
Legendary Uber-distro splits over the systemd controversy.
One of CeBIT’s most successful forums returns in 2015.
A new study says it is possible to unmask 81% of TOR users.
Redmond joins the revolution by turning the .NET Core Runtime into a GitHub project.
Users only had 7 hours to update before the intrusions started.
It's official: The new web arrives