Sys admin tools Smart tools for sys adminsNov 24, 2009
This month we check out some new tools and take a closer look at some classic system administration utilities.more »
The Apache Foundation had its big conference November 2-6 in Portland OR and Linux Pro Magazine was there with its camera. To celebrate the ten-year anniversary of the foundation, some highlights from the comprehensive program of talks are available for free in our video archives now.more »
Security Lessons: Rate Limiting Making sure your application is availableNov 24, 2009
Maybe we should listen to those network guys.more »
An SSH connection to a not directly linked system frequently makes at least one hop through the DMZ. The Belier tool simplifies this process. The program is now available in Debian's sid repository.more »
Introduction The sys admin's daily grind: HttptunnelSep 30, 2009
Just a couple of hours after completing this article, Charly headed off on vacation. Before he left, he indulged in a spot of piercing to help him work around the paranoid firewalls waiting for him in the Internet cafes at his holiday location.more »
The Network Security Toolkit (NST), a live DVD with countless security tools, is available in version 2.11.0. Much of the work focused on the installation and update mechanisms.more »
Intrusion Prevention Intro Understanding, detecting, and preventing network attacksAug 31, 2009
This month we look into the intruder's toolkit and investigate some prudent counter-measures for detecting and preventing attacks.more »
Security Visualization Tools Tools for visualizing IDS outputAug 31, 2009
Spot intruders with these easy security visualization tools.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.