KEY EXPERIENCE The sys admin's daily grind: Single-packet authenticationAug 26, 2008
Conventional, woodpecker-style port knocking is open to sniffing and brute force knocking attacks. Sending an encrypted packet with an access request to the server is safer and more modern. Learn more about Firewall Knock Operator, a.k.a. Fwknop.more »
Grendel Scan version 1.0, a Web application testing tools, was introduced at the Defcon Security Conference in Las Vegas.more »
OpenVPN counters censorship Open Source Software Helps Surmount China's "Great Firewall" Instrument Of CensorshipAug 07, 2008
Journalists at the 2008 Olympic Games in Beijing will not have unfettered access to the Internet. However, GPL software OpenVPN can be used to easily circumvent such censorship.more »
Tracing Intruders Intro Examining the art of computer forensicsAug 01, 2008
You don't need expensive proprietary tools to practice the craft of computer forensics.more »
Investigating Windows Systems Investigating Windows systems with LinuxAug 01, 2008
A forensics expert explains how to extract interesting details from a confiscated Windows hard disk using standard Linux tools.more »
Address Protection Fending off spam before it reaches your filterJul 10, 2008
Sometimes the best way to keep spam out of your mailbox is to keep the spammers from getting your address.more »
BackTrack Looking for security holes with BackTrackJul 09, 2008
The BackTrack live distribution lets you act like an intruder to test your network’s security.more »
Netfilter's Recent Module Building a dynamic blacklist with Netfilter's Recent moduleJul 07, 2008
Netfilter’s Recent module builds a temporary blacklist to keep intruders off your network.more »
The Bavarian capital shuns Microsoft, Google, and other alternatives to implement an open-source groupware solution.
Phone vendor partnerships bring Mark Shuttleworth's dream of Ubuntu on a phone a step closer to reality.
Donors will get to vote on new features for the free video editor.
Debian project puts init out to pasture and says no to Ubuntu's Upstart.
Ultra-sophisticated attack tool might have originated from a state-sponsored intelligence service.
New alternative for init comes with a small footprint and minimal configuration.
X marks the target for the next-generation windowing system.
Super-clone CentOS Linux gets beamed up to the mother ship.
HTML technology will enable new video editing and playback options.
New Linux distro is optimzed for gaming.