Snort Intrusion Detection with the Snort IDSOct 31, 2008
Search out hidden attacks with the Snort intrusion detection system.more »
Ed Schaefer reviews the newest edition of Hacking: The Art of Exploitation.more »
Coworkers at the University of Tel Aviv have presented a prototype for a new host-based intrusion detection system (HIDS) for Linux. Named Korset, it uses static code analysis and promises zero failures.more »
Tracing Intruders Intro Examining the art of computer forensicsJul 31, 2008
You don't need expensive proprietary tools to practice the craft of computer forensics.more »
Investigating Windows Systems Investigating Windows systems with LinuxJul 31, 2008
A forensics expert explains how to extract interesting details from a confiscated Windows hard disk using standard Linux tools.more »
BackTrack and Sleuth Kit Forensics with BackTrack and Sleuth KitJul 31, 2008
Once you determine a system has been attacked, boot to the BackTrack Live forensics distro and start your investigation with Sleuth Kit.more »
Expert Security Intro Staying one step ahead of the intrudersMay 31, 2008
Internet intruders have many ingenious ways of escalating privileges and hiding their presence once they get inside your system. The best protection is to keep them out in the cold.more »
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems