Coworkers at the University of Tel Aviv have presented a prototype for a new host-based intrusion detection system (HIDS) for Linux. Named Korset, it uses static code analysis and promises zero failures.more »
According to a report from Reuters, trading at the London Stock Exchange came to a standstill for seven hours because of computer problems on Monday.more »
Trackbacks in Drupal Configuring Trackbacks in DrupalSep 01, 2008
Trackbacks offer a simple means for bloggers to connect and share information.more »
RadialNet Visualizing your network with RadialNetSep 01, 2008
RadialNet draws a picture of the network, helping admins identify potential security holes.more »
Google's software for mobile communication, Android, is scheduled for release in November along with the Dream ''GPhone."more »
TorK Configuring the Tor network with TorKAug 01, 2008
If you're worried about eavesdroppers, connect to the Tor network with KDE's handy TorK configuration tool.more »
Tuning WLAN Routers Customizing your home router with OpenWrtAug 01, 2008
Learn how to take control of your home routing device with OpenWrt.more »
Charly's Column The Sysadmin’s Daily Grind: PostfilterJul 11, 2008
If protocols were human beings, NNTP would be a kind and slightly confused person that always believes the best of other people – even if they drop trash in the mailbox. Postfilter gives NNTP a watchdog.more »
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
FOSS community acts to protect freedom of choice for laptop devices.