Squid Bridge HTTP proxy with caching and content filtering on a bridgeOct 31, 2006
Caching proxies remember web pages and serve them up locally, saving both money and time. The most intelligent members of this family also remove dangerous content and provide transparent bridging.more »
Rootkits and Linux Security Kernel 2.6 rootkits and the quest for Linux securityJul 31, 2006
Your Linux system may not be so airtight after all. To understand the threats, you need to think like an intruder. We'll show you what the intruders are thinking now about the Linux 2.6 kernel.more »
Amavisd-new Filtering spam and viruses at the mail server with Amavisd-newDec 31, 2005
Sometimes the best time to stop bad mail is before it arrives. AmavisdNew is an Open Source interface for integrating spam and virus filtering with your mail server.more »
KlamAV KlamAV brings Clam Anti-Virus to your KDE desktopDec 31, 2005
Linux may not be as virus-ready as Windows, but who wants to harbor pointless malware? Now you can hunt for viruses with KDE's KlamAV, a desktop front-end for the ClamAV Open Source virus protection system.more »
Virus Checkers Virus protection tools for the Linux environmentDec 31, 2005
So you want a virus checker? We’ll show you what we found when we toured some of the top scanners for the Linux environment.more »
Viruses in Linux The ways of viruses in LinuxDec 31, 2005
Some say an attack is looming, and others say we don’t have to worry. What’s the real story on viruses in Linux?more »
Web Filters Privoxy and Webcleaner content filtersSep 30, 2005
Content filters protect a web user’s privacy and keep the flood of unsolicited advertising at bay. We’ll show you a pair of popular Open Source content filters.more »
SpamAssassin A Home-Grown Spam FilterFeb 28, 2005
Even if you do not have a mail server of your own, SpamAssassin can help you filter out unsolicited junk mail. This article describes how SpamAssassin collaborates with Evolution and KMail. Thunderbird, on the other hand, has its own simple spam-detection feature.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.