In an announcement at Linuxworld in San Francisco, Palm stated that it will be using the Wind River Linux platform for development based on the recently launched Foleo Linux device.more »
Bluetooth Hacks Exploring the secrets of Bluetooth in LinuxJun 30, 2007
The user rules in Linux – if you know where you’re going. This month the trail leads deep into the Linux Bluetooth stack.more »
Wlassistant Wlassistant helps you attach to a WLANNov 30, 2005
Laptop users who move among wireless networks need a simple and practical means for getting connected. A KDE tool titled Wlassistant helps you find the signal.more »
SCPM Managing network configurations with Suse’s SCPMAug 31, 2005
SCPM lets you switch your network configuration when your portable moves to a different network. Read on to learn more about deploying the SCPM profile manager with Suse Linux.more »
Hotspotter Attacks on wireless clientsJun 30, 2005
Security experts are always concerned with WLAN access points, but they sometimes forget that the client is also open to attack. Public hotspots make it quite easy for attackers to hijack connections, as the Hotspotter tool demonstrates.more »
Security Intro Knowing the ways of the enemyJun 30, 2005
Radius and 802.1X Securing Network Access with 802.1X, Radius, and LDAPFeb 28, 2005
The Radius protocol is typically used to authenticate users in dial-up scenarios. But Radius is also useful in LAN environments: in combination with 802.1X, Radius forces users to authenticate at a low level before the switch opens up a port.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.