The idea of an industry-wide common cryptography standard is certainly welcome. But self-interest usually precedes usability, so two industry consortiums are now vying over which standards to adopt, one on the side of Sun and the other leaning toward IBM/HP. Then there is an additional player in the Trusted Computing Group.more »
The Tor Project announces that it has removed all bugs that Coverity Scan had found in its software.more »
Charly's Column The sys admin's daily grind: Single-packet authenticationSep 30, 2008
Conventional, woodpecker-style port knocking is open to sniffing and brute force knocking attacks. Sending an encrypted packet with an access request to the server is safer and more modern. Learn more about Firewall Knock Operator, a.k.a. Fwknop.more »
Expert Security Intro Staying one step ahead of the intrudersMay 31, 2008
Internet intruders have many ingenious ways of escalating privileges and hiding their presence once they get inside your system. The best protection is to keep them out in the cold.more »
Enigmail Encrypting mail in ThunderbirdApr 30, 2008
Combining the Enigmail add-on and the GnuPG encryption software gives Thunderbird users a powerful tool for encrypting and signing email.more »
Version 2.0.0 of the GnuTLS security database improves access to X.509 certificates and adds RSA with SHA-256/384/512 certificates to the crop of supported crypto approaches.more »
CD Encryption Burning CDs and DVDS with an encrypted filesystemOct 31, 2006
An encrypted hard disk on your server is no help if valuable data on CDs or DVDs falls into the hands of spies. We’ll show you some convenient solutions for encrypting data on removable media.more »
Crypto Tricks Intro Disk-level cryptography in LinuxOct 31, 2006
Today’s computers are fast enough for some very sophisticated cryptography techniques. We’ll show you how to keep your data safe from the prying eyes of snoops and spies.more »
Linux users can now download and install the Windows code editor
New initiative will address security and interoperability concerns around container technology.
Developers can use RHEL as a development platform without a subscription fee.
Windows users will soon have native access to the Bash shell.
Improvements to SMTP will provide better guarantee of confidentiality
Graphics vendor embraces new reality in Linux graphics
Pioneer Ray Tomlinson bequeathed the @ sign to billions of Internet users
Redmond says its classic database tool will run without Windows
New intrusion technique affects most non-Bluetooth wireless mice
GENIVI Alliance announces the release of the first beta of the GENIVI Demo Platform ivi9.