Side Channel Attacks Some web applications send unnecessary information to attackers

Aug 23, 2012

Sometimes error messages or log entries are too verbose for their own good, disclosing valuable information to attackers.

more »

OpenVAS The OpenVAS vulnerability scanner

Aug 23, 2012

The more IT infrastructure complexity increases, the more indispensable vulnerability scanners become. If you are not interested in retaining the consulting services of a professional hacker, you might want to entrust the task of detecting vulnerabilities to a specialized software tool, such as OpenVAS.

more »

Security Lessons: Database Security Protecting your database

Aug 23, 2012

Your database can be one of the most vulnerable elements in your organization. We share some tips for detecting and preventing attacks.

more »

HTTPS Proxy Using a Squid proxy with HTTPS

Aug 23, 2012

How do you monitor the network when your client systems are connecting to secure web servers through HTTPS? We’ll show you how to keep watch using the Squid proxy server and share some inventive certificate tricks.

more »

Intrusion Detection with fail2ban

May 22, 2012

For its size, fail2ban, a utility that scans logfiles and bans suspicious IP addresses, punches well above its weight.

more »

Customizing PortSentry Do you have a sentry to keep an eye on your servers?

Apr 24, 2012

PortSentry monitors your ports and lets you know when they’ve been scanned.

more »

BackTrack Linux 5 R2 Released

Mar 09, 2012

Full release of BackTrack Linux 5 R2 is now available.

more »

Charly’s Column: w3af The sys admin’s daily grind: w3af

Mar 02, 2012

After toiling away to create a small but exclusive website, Charly wanted to run a security scanner against it to check for vulnerabilities. The choice of tools is enormous, but Charly chose w3af.

more »

Issue 26: Linux Shell Handbook 7th Ed./Special Editions

Buy this issue as a PDF

Digital Issue: Price $15.99
(incl. VAT)

News