No less than five vulnerabilities were eradicated by the release of a new version of the Apache Web server.more »
A joint survey performed by security experts from Infowatch and Russia's Securitylab points to the dangers that Instant Messengers (IM) can mean to enterprise communications structures.more »
The developers of the free bug tracking system, Bugzilla, advise users of older versions to update for security reasons.more »
Linux distributor Red Hat has discovered a vulnerability in the GNU "tar" program that could allow attackers to overwrite files.more »
Bluetooth Hacks Exploring the secrets of Bluetooth in LinuxJul 01, 2007
The user rules in Linux – if you know where you’re going. This month the trail leads deep into the Linux Bluetooth stack.more »
Blocking Spam Intro Facing down the masterminds of unsolicited Internet mailMar 01, 2007
Spammers charge real money for their dubious services, and hundreds of advertisers are willing to pay. We’ll show you some innovative techniques for controlling and containing spam, including strategies for slowing down spam bots, keeping spammers from getting your address, and separating spam from legitimate email.more »
Charly's Column The Sysadmin’s Daily Grind: ArpalertDec 01, 2006
Corporate policies prohibit the unauthorized connection of hardware to the company network, threatening dire consequences in the case of non-compliance. Fair enough, but how do you actually go about catching somebody trying to plug an illegal laptop into your Ethernet?more »
Crypto Tricks Intro Disk-level cryptography in LinuxNov 01, 2006
Today’s computers are fast enough for some very sophisticated cryptography techniques. We’ll show you how to keep your data safe from the prying eyes of snoops and spies.more »
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.