Qubes OS Exploring the Qubes OS secure operating systemJan 27, 2014
Most operating systems claim to be secure; however, most fail terribly. Newcomer Qubes OS tries a different approach, relying on a microkernel and pervasive virtualization.more »
A new web application helps users visualize distributed denial-of-service attacks.more »
Communication in the Post-PRISM World PRISM Break: Part 1Aug 12, 2013
Linux users didn’t need the recent NSA eavesdropping scandal to convince them that securing communication was a good idea. For years, free software developers have been creating secure tools that offer similar functionalities to all of those popular but very leaky services with ridiculous names.more »
Security Lessons: GlusterFS Secure storage with GlusterFSJul 02, 2013
You can create distributed, replicated, and high-performance storage systems using GlusterFS and some inexpensive hardware. Kurt explains.more »
Security Lessons: Signing Code Insecure updates are the rule, not the exceptionMay 31, 2013
Kurt looks at the practice of code signing and examines why so few upstream open source projects actually do it.more »
Stopping Drive-By Attacks Tools to prevent drive-by attacksMay 31, 2013
You won't find a perfect solution to the growing problem of drive-by attacks, but many tools are available to help you keep malicious code off your network.more »
Table of Contents: 152 What's inside the July 2013 issueMay 20, 2013
We look at SharePoint integration and show you how to manage Active Directory from Linux. But first, a special story on a dangerous new class of intrusion tools.more »
- US gov embraces open data
- Apache Cdorked.A exploit discovered
- News Bites
New Intel CEO
- FSF scolds W3C
- Torvalds releases Kernel 3.9
- Xen new LF collaboration project
- Debian 7.0“wheezy” debuts
- Windows XP most likely to be victim of attack.
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.