Snort Intrusion Detection with the Snort IDS

Oct 31, 2008

Search out hidden attacks with the Snort intrusion detection system.

more »

Hacking: The Art of Exploitation, 2nd Edition

Sep 16, 2008

Ed Schaefer reviews the newest edition of Hacking: The Art of Exploitation.

more »

Korset: Linux security thanks to static analysis

Sep 10, 2008

Coworkers at the University of Tel Aviv have presented a prototype for a new host-based intrusion detection system (HIDS) for Linux. Named Korset, it uses static code analysis and promises zero failures.

more »

Tracing Intruders Intro Examining the art of computer forensics

Jul 31, 2008

You don't need expensive proprietary tools to practice the craft of computer forensics.

more »

Investigating Windows Systems Investigating Windows systems with Linux

Jul 31, 2008

A forensics expert explains how to extract interesting details from a confiscated Windows hard disk using standard Linux tools.

more »

BackTrack and Sleuth Kit Forensics with BackTrack and Sleuth Kit

Jul 31, 2008

Once you determine a system has been attacked, boot to the BackTrack Live forensics distro and start your investigation with Sleuth Kit.

more »

Expert Security Intro Staying one step ahead of the intruders

May 31, 2008

Internet intruders have many ingenious ways of escalating privileges and hiding their presence once they get inside your system. The best protection is to keep them out in the cold.

more »

Sandboxing

May 31, 2008

 

more »
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News