Encrypting USB Sticks Protecting your USB sticks with encryptionJul 01, 2009
How easy is it to lose a USB stick? Why not protect your data just in case the stick falls into unfriendly hands?more »
Security Lessons The death of MD5 (and some SSL certificates)Mar 01, 2009
Researchers set out to compromise MD5 in an effort to convince people to stop using it. We explain how the attack worked and what this means for you.more »
The idea of an industry-wide common cryptography standard is certainly welcome. But self-interest usually precedes usability, so two industry consortiums are now vying over which standards to adopt, one on the side of Sun and the other leaning toward IBM/HP. Then there is an additional player in the Trusted Computing Group.more »
The Tor Project announces that it has removed all bugs that Coverity Scan had found in its software.more »
Charly's Column The sys admin's daily grind: Single-packet authenticationOct 01, 2008
Conventional, woodpecker-style port knocking is open to sniffing and brute force knocking attacks. Sending an encrypted packet with an access request to the server is safer and more modern. Learn more about Firewall Knock Operator, a.k.a. Fwknop.more »
Expert Security Intro Staying one step ahead of the intrudersJun 01, 2008
Internet intruders have many ingenious ways of escalating privileges and hiding their presence once they get inside your system. The best protection is to keep them out in the cold.more »
Enigmail Encrypting mail in ThunderbirdMay 01, 2008
Combining the Enigmail add-on and the GnuPG encryption software gives Thunderbird users a powerful tool for encrypting and signing email.more »
Version 2.0.0 of the GnuTLS security database improves access to X.509 certificates and adds RSA with SHA-256/384/512 certificates to the crop of supported crypto approaches.more »
The Bavarian capital shuns Microsoft, Google, and other alternatives to implement an open-source groupware solution.
Phone vendor partnerships bring Mark Shuttleworth's dream of Ubuntu on a phone a step closer to reality.
Donors will get to vote on new features for the free video editor.
Debian project puts init out to pasture and says no to Ubuntu's Upstart.
Ultra-sophisticated attack tool might have originated from a state-sponsored intelligence service.
New alternative for init comes with a small footprint and minimal configuration.
X marks the target for the next-generation windowing system.
Super-clone CentOS Linux gets beamed up to the mother ship.
HTML technology will enable new video editing and playback options.
New Linux distro is optimzed for gaming.