The U.S. network backup software provider TOLIS Group is preparing a new version of its BRU Server data security product and promises significant enhancements.more »
Professional users are always searching for an edge. Whether you work with Linux as a webmaster, programmer, system administrator, or security consultant, you know the best solution depends on finding the right tool for the job. We thought you might be interested in the following new products and updates.more »
Romain Gaucher, a specialist in web security, offers his Scalp tool in version 0.4. The log analyzer searches for attacks on Apache web applications.more »
Ed Schaefer reviews the newest edition of Hacking: The Art of Exploitation.more »
After discovering that some Fedora servers have been illegally accessed, the Fedora Project is, as of today, converting the signing keys for Linux distribution packages.more »
The latest version of the open source anti-virus scanner, ClamAV 0.94, promises to improve virus detection rates with enhanced scanning capabilities.more »
KEY EXPERIENCE The sys admin's daily grind: Single-packet authenticationAug 26, 2008
Conventional, woodpecker-style port knocking is open to sniffing and brute force knocking attacks. Sending an encrypted packet with an access request to the server is safer and more modern. Learn more about Firewall Knock Operator, a.k.a. Fwknop.more »
Grendel Scan version 1.0, a Web application testing tools, was introduced at the Defcon Security Conference in Las Vegas.more »
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.