The Massachusetts Institute of Technology (MIT) has founded the Kerberos Consortium with the aim of enhancing the Kerberos authentication protocol to provide a universal authentication method on open networks.more »
SerNet claimed the protocol specifications from Microsoft in order to enhance the open source software and make it interoperable.more »
Version 6.0 of the Bittorrent filesharing client will no longer be Open Source and it is currently available for Windows only.more »
Safer Surfing Staying ahead of Internet snoopers and con menMay 31, 2006
Do you know enough to surf free of the liars and spies? We’ll show you how to stay ahead of the traps.more »
Tor and Privoxy Anonymous surfing with Tor and PrivoxyMay 31, 2006
Internet users typically reveal their IP addresses, and this lets companies compile a profile of your Internet activities. Tor and Privoxy can help protect your privacy.more »
Netfilter L7 Blocking protocols at Layer 7 with the L7 patchFeb 28, 2006
If you need a tool for filtering protocols that doesn’t depend on the port, try L7, an IPTables patch that operates through regular expressions.more »
Admin Workshop: NTP Insider Tips: Network Time ProtocolOct 31, 2005
Networks often require very accurate timekeeping. The Network Time Protocol provides the time with precision.more »
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.
More embarrassment for Adobe's embattled multimedia tool
Mozilla’s script blocker add-on could be putting malware sites on the whitelist.
The Internet community officially banishes the notoriously unsafe Secure Sockets Layer protocol.