Charly's Column TUNNELING THE DUTCH BEACHESOct 01, 2006
What does Charly’s recent two-week vacation in Holland have in common with an SSH session? Nothing at all, at first sight. And therein lies a tale.more »
Perl: Link Spam A Perl script protects forums against spamOct 01, 2006
Spammers don’t just send email. They exploit discussion forums and blogs, posting pseudo-messages full of links to dupe search engines. A Perl script cleans up the mess.more »
Charly's Column The Sysadmin’s Daily Grind: HTTP Antivirus ProxySep 01, 2006
Browsers live in continual danger of compromise by a malicious site. An intermediate proxy combined with a virus scanner can help.more »
Bot_Attack An insidious spam botnet attacks CharlyAug 01, 2006
While going about his normal duties, Linux Magazine author Charly Kühnast was hit with a mean attack. Charly’s separate anti-spam server, which sits in front of his mail server, saved him from the mail storm.more »
How to Write a Rootkit Rootkits for the Linux kernel 2.6Aug 01, 2006
Today’s rootkits infiltrate a target system at kernel level, thus escaping unwanted attention from administrators. Read on for a practical look at how a kernel rootkit really works.more »
Charly's Column The Sysadmin’s Daily Grind: PolicydJul 01, 2006
The Postfix Policyd plugin fights spam using techniques such as greylisting, source detection, volume measurements, blacklisting, and HELO rotation detection.more »
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.