Digital Signatures and Encryption with SSL Secure email and LibreOffice documents

Dec 19, 2012

Using personal, self-signed certificates and digital encryption.

more »

Electronic Freedom Foundation Criticizes Ubuntu

Nov 01, 2012

The Electronic Frontier Foundation (EFF) publishes a blog post critical of the new search feature included in Ubuntu 12.10.

more »

Security Lessons: Web Frameworks Evaluating web frameworks

Oct 26, 2012

Stop re-inventing the wheel and build your web applications with the excellent tools already available.

more »

Linux News

Oct 26, 2012
  • AMD/OpenJDK/Oracle explore use of GPUs
  • Smartphone security
  • ASF Airavata
  • Slackware 14 release
  • Shuttleworth funds Inktank/Ceph
  • New Apache toplevel project
  • Zentyal 3.0 small business server reveals major release
  • Keccak wins NIST
  • SHA-3 competition
more »

Side Channel Attacks Some web applications send unnecessary information to attackers

Aug 23, 2012

Sometimes error messages or log entries are too verbose for their own good, disclosing valuable information to attackers.

more »

OpenVAS The OpenVAS vulnerability scanner

Aug 23, 2012

The more IT infrastructure complexity increases, the more indispensable vulnerability scanners become. If you are not interested in retaining the consulting services of a professional hacker, you might want to entrust the task of detecting vulnerabilities to a specialized software tool, such as OpenVAS.

more »

Linux News

Aug 23, 2012
  • OSI accepting individual memberships.
  • OpenGL 4.3 and ES 3.0.
  • License Protection
  • Raspberry Pi ramps up production.
  • FSFE protects licences when bankruptcy strikes.
  • Gaming passwords secured with My1login.
  • Web Apps new to Ubuntu.
  • LPI Forum
  • RSA Anti Rogue App.
  • US Cell Phone Right-to-Know Act.
more »

IPv6 Pen Testing Pen testing on IPv6 networks

Aug 23, 2012

If you have enabled IPv6 on your network without considering basic security issues, you might have opened up a hole for attackers. In this article, we demonstrate a successful attack on a server via IPv6 and explain how the popular security tools handle IPv6.

more »
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News