DM-Crypt/ LUKS Workshop: Encrypting hard disks with DM-Crypt and LUKSOct 31, 2006
Encrypting a home directory is easy. Encrypting your whole hard disk – including the root filesystem – takes a little more effort.more »
Anubis Centralized email encryption with AnubisJan 31, 2006
The Anubis mail manipulation daemon lets you centralize encryption for outgoing mail.more »
DM-Crypt Hard disk encryption with DM-Crypt, LUKS, and cryptsetupNov 30, 2005
If you’re serious about keeping secrets, try hard disk encryption with DM-Crypt and LUKS.more »
Thunderbird Security Secure email with Thunderbird and EnigmailJun 30, 2005
Thunderbird offers several options for secure email, and the GnuPG-based Enigmail encryption add-on provides an additional layer of protection.more »
Hotspotter Attacks on wireless clientsJun 30, 2005
Security experts are always concerned with WLAN access points, but they sometimes forget that the client is also open to attack. Public hotspots make it quite easy for attackers to hijack connections, as the Hotspotter tool demonstrates.more »
Security Intro Knowing the ways of the enemyJun 30, 2005
Encrypting Email Encrypting Email with KMail, Mozilla Thunderbird, and EvolutionFeb 28, 2005
The leading email applications include new features for helping users secure and authenticate their mail messages, but each tool has a different approach to handling tasks such as signing and encryption. This article describes how to add encryption and digital signatures to the Thunderbird, Kmail, and Evolution mail clients.more »
Secure Email Intro Mail Tools for a Hostile PlanetFeb 28, 2005
Don’t look now, but your mailbox is full of junk, and a snooper is live on a distant server, reading your opinions of your boss. Remember when email used to be easy? To restore some sanity to your correspondence, you’ll need the right tools.more »
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems