Tails Secure Distro Amnesiac IncognitoDec 04, 2012
These days, security and privacy issues are increasingly making the news, but where can the average free software user learn more about safer practices? One of the best answers I have found is Tails, a Debian-based distribution that seems as much about teaching users to make informed decisions as about the software itself.more »
Security Lessons: auditd Configuring and using auditdNov 26, 2012
The auditd tool can provide system logging capabilities to satisfy even the most paranoid users.more »
Researchers at Sandia National Laboratories have built a self-contained, Android-based network to study cyber disruptions and help secure hand-held devices.more »
Citrix announces version 6.1 of XenServer – a complete server virtualization platform built on the open source Xen hypervisor.more »
Testing Password Quality Creating secure passwords and testing their qualityOct 09, 2012
Create secure passwords with the help of a password generator and check for quality at the same time.more »
Red Hat has updated its messaging, real-time, and grid platform, Red Hat Enterprise MRG, to version 2.2.more »
The Zentyal Development Team releases Zentyal 3.0, a major release of its Linux small business server.more »
IPv6 Pen Testing Pen testing on IPv6 networksAug 23, 2012
If you have enabled IPv6 on your network without considering basic security issues, you might have opened up a hole for attackers. In this article, we demonstrate a successful attack on a server via IPv6 and explain how the popular security tools handle IPv6.more »
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.