IPv6 Pen Testing Pen testing on IPv6 networksAug 23, 2012
If you have enabled IPv6 on your network without considering basic security issues, you might have opened up a hole for attackers. In this article, we demonstrate a successful attack on a server via IPv6 and explain how the popular security tools handle IPv6.more »
Password Tools Creating secure passwords and testing their qualityAug 23, 2012
Create secure passwords with the help of a password generator and check for quality at the same time.more »
OpenSSL with Bash Using the OpenSSL toolkit with BashAug 23, 2012
Cryptography is an important part of IT security, and OpenSSL is a well-known cryptography toolkit for Linux. Experts depend on OpenSSL because it is free, it has huge capabilities, and it’s easy to use in Bash scripts.more »
Surveillance with NAS Network-attached storage keeps an eye on your stuffAug 23, 2012
Take advantage of the low watt per operation compute power offered by modern NAS to monitor your cameras.more »
Table of Contents: 143 Intrusion PreventionAug 23, 2012
New vulnerabilities appear every day. To keep your network safe, you need to think like an attacker.more »
Table of Contents: 142 Going VirtualJul 24, 2012
Your virtualization options continue to expand. This month, we look at two popular solutions. First, we show you how to map your virtual disks to optimize your KVM installation. Then, we examine the ins and outs of virtualization with VMware’s free vSphere Hypervisor 5.0.more »
Command Line: More Secure Passwords Improving account passwordsJul 24, 2012
Even with encrypted drives, account passwords remain one of the prime security methods for any Linux system. With a little knowledge of the available commands and their options, you can make your account passwords more secure.more »
Free Software Foundation considers Restricted Boot a threat to user freedom.more »
Mozilla’s script blocker add-on could be putting malware sites on the whitelist.
The Internet community officially banishes the notoriously unsafe Secure Sockets Layer protocol.
Popular desktop environment continues the Gnome 2 legacy – with new support for the Gnome 3 toolkit.
The Obama White House has issued a memorandum telling all US government agencies they must use HTTPS for all websites and web communication.
New program will dial up security for the Firefox browser.
Red Hat's community distro embraces the cloud.
New partnership will bring more and better CS training to US schools
Criminals offer online help over Tor network
Sophisticated malware is still present on Joomla and WordPress sites around the world.
Future versions of Ubuntu's code service will support the popular Git version control system used with Linux and other open source projects.