A null-pointer dereference in the Linux kernel allows local users to assume root privileges. Brad Spengler, who claims first discovery, announced that he will present a corresponding exploit during the course of the day.more »
Tailbeep is a simple administration tool that sends an audible beep when it finds a specified search string in a log file. Version 0.45 now includes an interface to the Festival speech synthesis framework.more »
The current discussion in the Ubuntu forums is about a possible security hole in GNOME, specifically about GNOME registered users having their passwords appear as cleartext on the keyring. Not a bug, say its defenders, but the security concept behind the GNOME keyring.more »
Security Lessons Kismet, Aircrack-ng, and KarmetasploitNov 01, 2009
How to find, map, crack, and impersonate wireless networks.more »
The Linux-Kongress is traditionally where kernel developers exchange honors and advice about new features and enhancements. This year a number of speakers presented performance improvement data and discussed what aspects of Linux can be drawn out even more.more »
Italian firm Endian has completed work on a Linux-based firewall software product in version 2.3. The Community edition of the Endian Firewall (EFW) includes features that were previously available for paying customers only.more »
Most Linux users think of Trusted Platform Module (TPM) as digital rights management (DRM), i.e. software freedom prevention. However, TPM used in some Intel computer modules may have some useful functions.more »
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.