Coworkers at the University of Tel Aviv have presented a prototype for a new host-based intrusion detection system (HIDS) for Linux. Named Korset, it uses static code analysis and promises zero failures.more »
According to a report from Reuters, trading at the London Stock Exchange came to a standstill for seven hours because of computer problems on Monday.more »
Trackbacks in Drupal Configuring Trackbacks in DrupalSep 01, 2008
Trackbacks offer a simple means for bloggers to connect and share information.more »
RadialNet Visualizing your network with RadialNetSep 01, 2008
RadialNet draws a picture of the network, helping admins identify potential security holes.more »
Google's software for mobile communication, Android, is scheduled for release in November along with the Dream ''GPhone."more »
TorK Configuring the Tor network with TorKAug 01, 2008
If you're worried about eavesdroppers, connect to the Tor network with KDE's handy TorK configuration tool.more »
Tuning WLAN Routers Customizing your home router with OpenWrtAug 01, 2008
Learn how to take control of your home routing device with OpenWrt.more »
Charly's Column The Sysadmin’s Daily Grind: PostfilterJul 11, 2008
If protocols were human beings, NNTP would be a kind and slightly confused person that always believes the best of other people – even if they drop trash in the mailbox. Postfilter gives NNTP a watchdog.more »
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.