Steganography Intro Steganography and other strategies from the real worldJan 26, 2010
This month we look at hidden data, dastardly PDFs, safer surfing, and tools for better password control.more »
Security Lessons Overflows, underflows, and other security flawsDec 21, 2009
Our security guy looks at software tools that you can use to audit and secure your software.more »
OpenVAS Exploring the OpenVAS vulnerability scannerDec 01, 2009
If you prefer to travel light and free, try OpenVAS, a GPLed fork of the Nessus scanning tool.more »
Sys admin tools Smart tools for sys adminsNov 24, 2009
This month we check out some new tools and take a closer look at some classic system administration utilities.more »
The Apache Foundation had its big conference November 2-6 in Portland OR and Linux Pro Magazine was there with its camera. To celebrate the ten-year anniversary of the foundation, some highlights from the comprehensive program of talks are available for free in our video archives now.more »
Security Lessons: Rate Limiting Making sure your application is availableNov 24, 2009
Maybe we should listen to those network guys.more »
An SSH connection to a not directly linked system frequently makes at least one hop through the DMZ. The Belier tool simplifies this process. The program is now available in Debian's sid repository.more »
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.