Access Control Lists Working with Access Control ListsMay 31, 2008
The ancient Linux permission system is often insufficient for complex production environments. Access Control Lists offer a flexible alternative.more »
SE Linux Mandatory Access Control (MAC) with SELinuxMay 31, 2008
SELinux provides a safer system through the powerful concept of mandatory access controls.more »
Sshutout and Fail2ban Fighting dictionary attacks with Sshutout and Fail2banMay 31, 2008
Services that require a username and password for login are potential targets for dictionary attacks. Sshutout and Fail2ban introduce time penalties for invalid attempts.more »
The GnuTLS project has published two bugfix releases to close several vulnerabilities and resolve an error capable of interrupting connections.more »
The security and quality of Open Source software just keeps on improving, as code analysis by Coverity reveals.more »
Red Hat's David Airlie reports in his blog that a simple hack allowed him to develop an X server without root privileges in the course of just one afternoon.more »
Security researchers iDefense have disclosed three vulnerabilities in the Rdesktop Remote Client.more »
The Ubuntu security team has released an update to close a vulnerability in the Vorbis Tools for editing music files in Ogg-Vorbis format.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.