Netfilter L7 Blocking protocols at Layer 7 with the L7 patchFeb 28, 2006
If you need a tool for filtering protocols that doesn’t depend on the port, try L7, an IPTables patch that operates through regular expressions.more »
Charly's Column The Sysadmin’s Daily Grind: Webalizer XtendedFeb 28, 2006
Webalizer is a tool for analyzing web server logfiles. A new patch lets admins see what isn’t there.more »
Charly's Column The Sysadmin’s Daily Grind: Mod_evasiveDec 31, 2005
The Apache web server can fight back against DoS attacks. You just need a little help from Mod_evasive.more »
Nmap Methods Understanding Nmap analysis techniquesDec 31, 2005
How does the popular Nmap scanner identify holes in network security? In this article, we examine some Nmap analysis techniques.more »
Charly's Column The Sysadmin’s Daily Grind: SargNov 30, 2005
A busy proxy server is something that no self-respecting admin should leave to its own devices. The Squid logfile analyzer, dubbed Sarg by its author, helps you keep your Squid servers on track.more »
Charly's Column The Sysadmin’s Daily Grind: TorOct 31, 2005
Some people don’t mind leaving traces of their IP address wherever they go, others prefer to use a tool like The Onion Router.more »
Java Anonymous Proxy Anonymous surfing with Java Anonymous ProxyOct 31, 2005
Many Websites log IP addresses and access times to identify users. If you don’t want to wind up as data in someone’s market research, the Java Anonymous Proxy will keep your surfing secret.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.