Virtualization Intro Choosing tools for effective virtualizationApr 30, 2008
Good tools are half the battle – even if you are just managing virtual machines. This month we take a practical look at virtualization, and we show you a new threat to watch for in the virtual future.more »
Hercules Mainframe Emulator Hercules mainframe emulatorApr 30, 2008
Many enterprises still rely heavily on mainframes, which makes it all the more difficult to get your hands on one and install Linux on it. The Hercules emulator gives you a full-fledged alternative.more »
Virtualizing with Xen Getting started with Xen virtualizationApr 30, 2008
The powerful and popular Xen virtualization system offers an easy solution for running Windows on Linux.more »
Networking with VirtualBox Networking with VirtualBoxApr 30, 2008
Tour the VirtualBox virtualization tool, a free and easy environment for virtual versions of Linux, Unix, and Windows.more »
Virtualizing Rootkits Virtualizing rootkits and the future of system securityApr 30, 2008
A new generation of rootkits avoids detection by virtualizing the compromised system – and the user doesn't notice a thing.more »
Novell today announced it has entered into a definitive agreement to acquire PlateSpin Ltd. The purchasing price is said to be US$ 205 m.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm