Table of Contents: 147 What's inside the February 2013 issueDec 19, 2012
Use these advanced troubleshooting techniques to save lost Windows and Linux systems.more »
The Electronic Frontier Foundation (EFF) publishes a blog post critical of the new search feature included in Ubuntu 12.10.more »
Table of Contents: 145 What's inside the December 2012 issueOct 26, 2012
Building a botnet doesn’t necessarily make you an outlaw; we show you how one programmer automated a timesensitive business application with a botnet. Next, get ready to hit the ground running with HTML5, and secure your websites with sound PHP programming principles.more »
Security Lessons: Web Frameworks Evaluating web frameworksOct 26, 2012
Stop re-inventing the wheel and build your web applications with the excellent tools already available.more »
- AMD/OpenJDK/Oracle explore use of GPUs
- Smartphone security
- ASF Airavata
- Slackware 14 release
- Shuttleworth funds Inktank/Ceph
- New Apache toplevel project
- Zentyal 3.0 small business server reveals major release
- Keccak wins NIST
- SHA-3 competition
Side Channel Attacks Some web applications send unnecessary information to attackersAug 23, 2012
Sometimes error messages or log entries are too verbose for their own good, disclosing valuable information to attackers.more »
OpenVAS The OpenVAS vulnerability scannerAug 23, 2012
The more IT infrastructure complexity increases, the more indispensable vulnerability scanners become. If you are not interested in retaining the consulting services of a professional hacker, you might want to entrust the task of detecting vulnerabilities to a specialized software tool, such as OpenVAS.more »
- OSI accepting individual memberships.
- OpenGL 4.3 and ES 3.0.
- License Protection
- Raspberry Pi ramps up production.
- FSFE protects licences when bankruptcy strikes.
- Gaming passwords secured with My1login.
- Web Apps new to Ubuntu.
- LPI Forum
- RSA Anti Rogue App.
- US Cell Phone Right-to-Know Act.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.