Capture File Filtering with Wireshark Reading a packet capture file with Wireshark and tsharkAug 23, 2012
Wireshark doesn’t just work in real time. If you save a history of network activity in a pcap file using a tool such as tcpdump, you can filter the data with Wireshark to search for evidence.more »
Side Channel Attacks Some web applications send unnecessary information to attackersAug 23, 2012
Sometimes error messages or log entries are too verbose for their own good, disclosing valuable information to attackers.more »
OpenVAS The OpenVAS vulnerability scannerAug 23, 2012
The more IT infrastructure complexity increases, the more indispensable vulnerability scanners become. If you are not interested in retaining the consulting services of a professional hacker, you might want to entrust the task of detecting vulnerabilities to a specialized software tool, such as OpenVAS.more »
Security Lessons: Database Security Protecting your databaseAug 23, 2012
Your database can be one of the most vulnerable elements in your organization. We share some tips for detecting and preventing attacks.more »
HTTPS Proxy Using a Squid proxy with HTTPSAug 23, 2012
How do you monitor the network when your client systems are connecting to secure web servers through HTTPS? We’ll show you how to keep watch using the Squid proxy server and share some inventive certificate tricks.more »
For its size, fail2ban, a utility that scans logfiles and bans suspicious IP addresses, punches well above its weight.more »
Customizing PortSentry Do you have a sentry to keep an eye on your servers?Apr 24, 2012
PortSentry monitors your ports and lets you know when they’ve been scanned.more »
Full release of BackTrack Linux 5 R2 is now available.more »
New release targets Linux professionals.
The Fedora project adds Wayland and Gnome 3.22
CeBIT 2017: Open Source Forum Call for Papers
Long-time Linux antagonist joins the revolution.
Major bug affects Debian/Ubuntu distributions.
Canonical releases the minimal edition for embedded devices, Internet of Things, and cloud deployments.
The new release features improvements across the board, from performance to security.
Two out of three of the new members are women.
More than 5,000 people attended the event.
Linux Magazine will include the best of both magazines.