How to Write a Rootkit Rootkits for the Linux kernel 2.6Jul 31, 2006
Today’s rootkits infiltrate a target system at kernel level, thus escaping unwanted attention from administrators. Read on for a practical look at how a kernel rootkit really works.more »
Charly's Column The Sysadmin’s Daily Grind: PolicydJun 30, 2006
The Postfix Policyd plugin fights spam using techniques such as greylisting, source detection, volume measurements, blacklisting, and HELO rotation detection.more »
Sendmail Strategies Fighting spam and viruses with SendmailJun 30, 2006
A structured approach to Sendmail helps to maximize your spam and virus protection.more »
Antsp2p Anonymous Filesharing with Antsp2pMay 31, 2006
Filesharing is a favorite leisure activity for many Internet users. But conventional filesharing tools have one major drawback – they aren’t anonymous. The Antsp2p project aims to change this.more »
Charly's Column The Sysadmin’s Daily Grind: Nmap 4Apr 30, 2006
Many tools keep growing with each new version, but Nmap 4.00 has lost weight thanks to the Diet-Nmap project. The latest incarnation of Nmap is not only quicker, it is also more frugal with memory.more »
AppArmor Hardening systems with AppArmorApr 30, 2006
After penetrating a remote system, intruders might think they are home and dry, but AppArmor spoils the fun, locking the miscreants in a virtual cage.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.