Hacking: The Art of Exploitation, 2nd Edition

Sep 16, 2008

Ed Schaefer reviews the newest edition of Hacking: The Art of Exploitation.

more »

Korset: Linux security thanks to static analysis

Sep 10, 2008

Coworkers at the University of Tel Aviv have presented a prototype for a new host-based intrusion detection system (HIDS) for Linux. Named Korset, it uses static code analysis and promises zero failures.

more »

Tracing Intruders Intro Examining the art of computer forensics

Aug 01, 2008

You don't need expensive proprietary tools to practice the craft of computer forensics.

more »

Investigating Windows Systems Investigating Windows systems with Linux

Aug 01, 2008

A forensics expert explains how to extract interesting details from a confiscated Windows hard disk using standard Linux tools.

more »

BackTrack and Sleuth Kit Forensics with BackTrack and Sleuth Kit

Aug 01, 2008

Once you determine a system has been attacked, boot to the BackTrack Live forensics distro and start your investigation with Sleuth Kit.

more »

Expert Security Intro Staying one step ahead of the intruders

Jun 01, 2008

Internet intruders have many ingenious ways of escalating privileges and hiding their presence once they get inside your system. The best protection is to keep them out in the cold.

more »

Sandboxing

Jun 01, 2008

 

more »

Nagios Workshop Watching your systems with Nagios

May 29, 2008

Nagios monitors your network and provides early warning for problems with hosts and services.

more »

Issue 163/2014

Buy this issue as a PDF

Digital Issue: Price $9.99
(incl. VAT)

News