Steganography Intro Steganography and other strategies from the real worldJan 26, 2010
This month we look at hidden data, dastardly PDFs, safer surfing, and tools for better password control.more »
Security Lessons Overflows, underflows, and other security flawsDec 21, 2009
Our security guy looks at software tools that you can use to audit and secure your software.more »
OpenVAS Exploring the OpenVAS vulnerability scannerDec 01, 2009
If you prefer to travel light and free, try OpenVAS, a GPLed fork of the Nessus scanning tool.more »
Sys admin tools Smart tools for sys adminsNov 24, 2009
This month we check out some new tools and take a closer look at some classic system administration utilities.more »
The Apache Foundation had its big conference November 2-6 in Portland OR and Linux Pro Magazine was there with its camera. To celebrate the ten-year anniversary of the foundation, some highlights from the comprehensive program of talks are available for free in our video archives now.more »
Security Lessons: Rate Limiting Making sure your application is availableNov 24, 2009
Maybe we should listen to those network guys.more »
An SSH connection to a not directly linked system frequently makes at least one hop through the DMZ. The Belier tool simplifies this process. The program is now available in Debian's sid repository.more »
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.