Astaro 8.100 focuses on Wireless functionality of Access Points and Wifi Controllersmore »
Security Lessons: Disposable Computers Avoiding cyberattackSep 29, 2010
One way to avoid having your personal information stolen is to use a disposable computer set up for sensitive operations.more »
Security Lessons: Linux WAP Wireless security and LinuxAug 31, 2010
If you are looking for a cheap and secure wireless router setup, check out Tomato, DD-WRT, or OpenWrt.more »
The secure communication solution gets an upgrade.more »
Security Lessons: Checking Signatures Signed, sealed, and deliveredJul 27, 2010
How to avoid malicious code on Linux.more »
Filter Proxy for AD Virus scanner and content filter with AD authenticationJun 29, 2010
You might want to reap the benefits of active directory’s single sign-on for your virus scanning and content filtering. If you also use Squid to handle user access to the internet, you have a front-row seat for “when worlds collide.”more »
Security Lessons: DNSSEC DNSSEC primerJun 28, 2010
One of the largest holes in the Internet is finally plugged.more »
Charly's Column The sys admin’s daily grind: login mailJun 28, 2010
Charly often gets suggestions and ideas for his column at community get-togethers. Last week, he picked up a tip for an early warning system that quickly secures login attempts.more »
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.