Coworkers at the University of Tel Aviv have presented a prototype for a new host-based intrusion detection system (HIDS) for Linux. Named Korset, it uses static code analysis and promises zero failures.more »
Tracing Intruders Intro Examining the art of computer forensicsJul 31, 2008
You don't need expensive proprietary tools to practice the craft of computer forensics.more »
Investigating Windows Systems Investigating Windows systems with LinuxJul 31, 2008
A forensics expert explains how to extract interesting details from a confiscated Windows hard disk using standard Linux tools.more »
BackTrack and Sleuth Kit Forensics with BackTrack and Sleuth KitJul 31, 2008
Once you determine a system has been attacked, boot to the BackTrack Live forensics distro and start your investigation with Sleuth Kit.more »
Expert Security Intro Staying one step ahead of the intrudersMay 31, 2008
Internet intruders have many ingenious ways of escalating privileges and hiding their presence once they get inside your system. The best protection is to keep them out in the cold.more »
Nagios Workshop Watching your systems with NagiosMay 29, 2008
Nagios monitors your network and provides early warning for problems with hosts and services.more »
Network Monitoring Intro Tools and tricks for monitoring your networkMay 27, 2008
If you can’t monitor everything yourself, why not let your computers watch your computers? This month we examine some practical techniques for network monitoring.more »
The bug was introduced back in 2009 and has been lurking around all this time.
The new release deprecates the sshd_config UsePrivilegeSeparation option.
Lives on as a community project
Five new systems join Dell XPS 13 Developer Edition that come with Ubuntu pre-installed.
The Skype Linux client now has almost the same capabilities that it enjoys on other platforms.
At CeBIT 2017, OpenStack Day will offer a wide range of lectures and discussions.
A major setback for the Linux desktop.
Improved support for GPU in virtualization.
News site for the openSUSE community falls victim to a Wordpress exploit.
The source code is available online.