When I was thinking about ways you could rescue your system with Linux, the thought occurred to me: Why not rescue your life? Because that’s what Linux can do for you.more »
Testing Password Quality Creating secure passwords and testing their qualityOct 09, 2012
Create secure passwords with the help of a password generator and check for quality at the same time.more »
Linux Mint Announces mintBox
ownCloud Introduces Version 4
Mozilla Updates Thunderbird
Obnam 1.0 Releasedmore »
UEFI and Secure Boot No Free BootsJun 20, 2012
The imminent Windows 8 implementation of UEFI with Secure Boot adds an extra layer of complexity for some Linux users. We look at the problem and two solutions from Fedora and Canonical.more »
Carry your own Linux with this new hardware-encrypted boot stick.more »
You may have already tried PGP/GPG public key encryption for documents or mail, but do you know what’s going on under the hood and what level of security you’re actually getting? We take an in-depth look at GnuPG encryption.more »
Charly’s Column: haveged The sys admin’s daily grind: haveged Random ReleaseSep 02, 2011
Practical cryptography is often an encounter with many random numbers in just a few moments. Entropy is the raw material that gives birth to the random number, but it’s harder to come by than you might think.more »
Red Hat announces IBM, Accenture, Alfresco, Cisco, HP and Intel representatives are scheduled to deliver keynotes at the seventh annual Red Hat Summit and JBoss World, May 3-6, 2011 in Boston, Massachusetts.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm