KEY EXPERIENCE The sys admin's daily grind: Single-packet authenticationAug 26, 2008
Conventional, woodpecker-style port knocking is open to sniffing and brute force knocking attacks. Sending an encrypted packet with an access request to the server is safer and more modern. Learn more about Firewall Knock Operator, a.k.a. Fwknop.more »
Grendel Scan version 1.0, a Web application testing tools, was introduced at the Defcon Security Conference in Las Vegas.more »
OpenVPN counters censorship Open Source Software Helps Surmount China's "Great Firewall" Instrument Of CensorshipAug 07, 2008
Journalists at the 2008 Olympic Games in Beijing will not have unfettered access to the Internet. However, GPL software OpenVPN can be used to easily circumvent such censorship.more »
Tracing Intruders Intro Examining the art of computer forensicsAug 01, 2008
You don't need expensive proprietary tools to practice the craft of computer forensics.more »
Investigating Windows Systems Investigating Windows systems with LinuxAug 01, 2008
A forensics expert explains how to extract interesting details from a confiscated Windows hard disk using standard Linux tools.more »
Address Protection Fending off spam before it reaches your filterJul 10, 2008
Sometimes the best way to keep spam out of your mailbox is to keep the spammers from getting your address.more »
BackTrack Looking for security holes with BackTrackJul 09, 2008
The BackTrack live distribution lets you act like an intruder to test your network’s security.more »
Netfilter's Recent Module Building a dynamic blacklist with Netfilter's Recent moduleJul 07, 2008
Netfilter’s Recent module builds a temporary blacklist to keep intruders off your network.more »
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.
Quintessential open source browser shores up its market share with a step toward the proprietary dark side.
Authorities in 16 countries take action against users of the imfamous BlackShades malware tool.