Command Line – Bastille Linux Learning the basics of architectural security

Feb 22, 2013

Security applications like antivirus protectors respond to events, rather than preventing them from happening, but the best security in Linux is architectural – that is, in its configuration.

more »

Grsecurity Airtight system security with Grsecurity

Feb 22, 2013

Security-conscious people dig a deep moat with crocodiles around their homes, hide their furniture in back rooms, and only let visitors into the bathroom if they know the secret password. Grsecurity follows a similarly extreme principle.

more »

FIDO Alliance Formed to “Revolutionize” Online Authentication

Feb 15, 2013

Forget passwords – several Internet companies have formed the FIDO (Fast IDentity Online) Alliance, which they say will replace passwords with safer and easier to use authentication methods.

more »

Table of Contents: 148 What's inside the March 2013 issue

Jan 23, 2013

Science fiction authors and high-tech visionaries dream of a future where humans and computers communicate in ordinary English. A new cloud-based tool brings that future a little closer.

more »

Security Lessons – Hash Maps Security with data structures

Jan 23, 2013

What do all programs have in common? They store data at some point, usually in arrays – everything from commandline options to the input and output. But how is data actually stored by the program? Kurt explains.

more »

Linux News

Dec 19, 2012
  • OpenShift for data centers and clouds
  • MariaDB non-profit foundation launched
  • Fedora 18 to include Mate desktop
  • Oracle repository for kernel changes
  • NVidia GeForce R310
  • Android OS leads the smartphone market
  • Microsoft contemplating yearly major release cycle
  • HP writes off US$ 8.8 million on Autonomy
  • Stallman alleges “surveillance code” in Unity
more »

Security Lessons: Secure Backup Back up your systems securely

Dec 19, 2012

Creating backups is one thing, making sure they’re secure is another. We offer some tips for ensuring the process is as painless as possible.

more »

IPv6 Penetration Testing Pen testing on IPv6 networks: In Through the Back Door

Dec 17, 2012

If you have enabled IPv6 on your network without considering basic security issues, you might have opened up a hole for attackers. In this article, we demonstrate a successful attack on a server via IPv6 and explain how the popular security tools handle IPv6.

more »

News

njobs Europe
What:
Where:
Country:
Njobs Netherlands Njobs Deutschland Njobs United Kingdom Njobs Italia Njobs France Njobs Espana Njobs Poland
Njobs Austria Njobs Denmark Njobs Belgium Njobs Czech Republic Njobs Mexico Njobs India Njobs Colombia