Security Lessons: Database Security Protecting your databaseAug 23, 2012
Your database can be one of the most vulnerable elements in your organization. We share some tips for detecting and preventing attacks.more »
OpenSSL with Bash Using the OpenSSL toolkit with BashAug 23, 2012
Cryptography is an important part of IT security, and OpenSSL is a well-known cryptography toolkit for Linux. Experts depend on OpenSSL because it is free, it has huge capabilities, and it’s easy to use in Bash scripts.more »
HTTPS Proxy Using a Squid proxy with HTTPSAug 23, 2012
How do you monitor the network when your client systems are connecting to secure web servers through HTTPS? We’ll show you how to keep watch using the Squid proxy server and share some inventive certificate tricks.more »
Table of Contents: 143 Intrusion PreventionAug 23, 2012
New vulnerabilities appear every day. To keep your network safe, you need to think like an attacker.more »
Resetting Passwords with SystemRescueCd SystemRescueCdJul 31, 2012
If you’re locked out of your Linux or Windows system, a handy Live Linux troubleshooting distro might be all you need to get back in. We’ll show you how to pick the lock with SystemRescueCd.more »
- Red Hat Addresses Secure Boot
- FSF Addresses Secure Boot
- Android 4.1 Jelly Bean
Security Lessons: Virtual Hosts Serving websites as unique users off a single serverJul 24, 2012
Creating secure websites with their own privileges on a single server.more »
Cmdfs Building virtual filesystemsJun 27, 2012
Cmdfs builds a filtered virtual filesystem based on a source directory tree. You can even integrate other programs to convert data on the fly.more »
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.