FCC's authority called into questionmore »
Steganography Intro Steganography and other strategies from the real worldJan 26, 2010
This month we look at hidden data, dastardly PDFs, safer surfing, and tools for better password control.more »
The Mozilla Firefox 3.6 browser is now available and provides performance improvements and numerous technical enhancements.more »
Microsoft has decided to issue a special patch outside its usual patchday rhythm for all its Internet Explorer versions to close a severe vulnerability issue. Downloads of Firefox have accordingly skyrocketed.more »
The Apache Foundation had its big conference November 2-6 in Portland OR and Linux Pro Magazine was there with its camera. To celebrate the ten-year anniversary of the foundation, some highlights from the comprehensive program of talks are available for free in our video archives now.more »
Introduction The sys admin's daily grind: HttptunnelOct 01, 2009
Just a couple of hours after completing this article, Charly headed off on vacation. Before he left, he indulged in a spot of piercing to help him work around the paranoid firewalls waiting for him in the Internet cafes at his holiday location.more »
Intrusion Prevention Intro Understanding, detecting, and preventing network attacksSep 01, 2009
This month we look into the intruder's toolkit and investigate some prudent counter-measures for detecting and preventing attacks.more »
Security fixes address a few vulnerabilities in Mozilla Thunderbird and SeaMonkey.more »
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.