Tailbeep is a simple administration tool that sends an audible beep when it finds a specified search string in a log file. Version 0.45 now includes an interface to the Festival speech synthesis framework.more »
Italian firm Endian has completed work on a Linux-based firewall software product in version 2.3. The Community edition of the Endian Firewall (EFW) includes features that were previously available for paying customers only.more »
Portsmith User-level firewalling with PortsmithMay 31, 2009
The Linux packet filter iptables lacks a function that dynamically enables ports for authenticated users. Portsmith plugs this gap, allowing users to enable their own connections.more »
De-Perimeterization De-perimeterization and life after the firewallMar 24, 2009
Enterprises and organizations used to feel protected behind the firewall, but now VPNs, e-commerce, web services, and Web 2.0 have put an end to the comfort. The network perimeter is losing its significance, and the time has come for a new approach to security.more »
Minix 3 Minix 3 and the microkernel experienceJan 31, 2009
Minix is often viewed as the spiritual predecessor of Linux, but these two Unix cousins could never agree on the kernel design. Now a new Minix with a BSD-style free license is poised to attract a new generation of users.more »
Hping Security testing with hpingJan 31, 2009
Don't let intruders crash your dance. We'll show you how to test your firewalls and intrusion detection systems with hping.more »
The Shoreline Firewall product, also known as Shorewall, has arrived in its 4.2.4 version. The new release includes a configuration tool for IPv6 networks.more »
Israeli security firm Yoggie has released its Linux-based USB Stick Firewall Gatekeeper product in an Open Source version. The open firewall products also include a developer kit.more »
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems