Security Lessons Linux security in the cloudMar 28, 2011
Although you give up control of the underlying infrastructure when you use cloud computing, you can still maintain some control over security.more »
Intrusion Detection Platform-independent and extensible IDS with PreludeMar 23, 2011
The Prelude security information management system receives both host- and network-based IDS messages and displays them in an easy web interface. We show you how to set it up.more »
Security Lessons: Secure Video Secure Video SurveillanceMar 01, 2011
Unless your surveillance cameras are wired directly to a video board, they are notoriously insecure. We show you how to keep your cameras from being compromised.more »
The Institute for Security and Open Methodologies (ISECOM) announced the released of the Open Source Security Testing Methodology Manual (OSSTMM) 3.0.more »
Caine The Caine 2.0 forensic distributionNov 29, 2010
Caine is a Linux distribution based on Ubuntu 10.04 for forensic scientists and security-conscious administrators. Poised to do battle against IT ne’er-do-wells, Caine has a comprehensive selection of software, a user-friendly GUI, and responsive support.more »
The 2010 security report looks at more than 291 projects, with special focus on the Android 2.6.32 kernelmore »
Security Lessons Plugin VulnerabilitiesOct 27, 2010
Plugins provide a lot of functionality but, depending on their quality, they can provide unwanted security issues as well. We show you how to protect yourself from plugins.more »
Security Lessons: Disposable Computers Avoiding cyberattackSep 29, 2010
One way to avoid having your personal information stolen is to use a disposable computer set up for sensitive operations.more »
“Xenial Xerus” comes with a new packages format and several improvements for the enterprise.
Linux users can now download and install the Windows code editor
New initiative will address security and interoperability concerns around container technology.
Developers can use RHEL as a development platform without a subscription fee.
Windows users will soon have native access to the Bash shell.
Improvements to SMTP will provide better guarantee of confidentiality
Graphics vendor embraces new reality in Linux graphics
Pioneer Ray Tomlinson bequeathed the @ sign to billions of Internet users
Redmond says its classic database tool will run without Windows
New intrusion technique affects most non-Bluetooth wireless mice