The Massachusetts Institute of Technology (MIT) has founded the Kerberos Consortium with the aim of enhancing the Kerberos authentication protocol to provide a universal authentication method on open networks.more »
SerNet claimed the protocol specifications from Microsoft in order to enhance the open source software and make it interoperable.more »
Version 6.0 of the Bittorrent filesharing client will no longer be Open Source and it is currently available for Windows only.more »
Safer Surfing Staying ahead of Internet snoopers and con menMay 31, 2006
Do you know enough to surf free of the liars and spies? We’ll show you how to stay ahead of the traps.more »
Tor and Privoxy Anonymous surfing with Tor and PrivoxyMay 31, 2006
Internet users typically reveal their IP addresses, and this lets companies compile a profile of your Internet activities. Tor and Privoxy can help protect your privacy.more »
Netfilter L7 Blocking protocols at Layer 7 with the L7 patchFeb 28, 2006
If you need a tool for filtering protocols that doesn’t depend on the port, try L7, an IPTables patch that operates through regular expressions.more »
Admin Workshop: NTP Insider Tips: Network Time ProtocolOct 31, 2005
Networks often require very accurate timekeeping. The Network Time Protocol provides the time with precision.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.