Wireshark Practical uses for the Wireshark traffic snifferJul 03, 2008
If you know your way around network protocols, you can get to the source of a problem quickly with Wireshark.more »
Partimage Backing up partitions with PartimageJul 02, 2008
Protect your system and preserve your configuration with this powerful backup tool.more »
Bluetooth Security What your phone vendor didn’t tell you about Bluetooth securityJul 02, 2008
Is your address book open to the world? Is your mobile phone calling Russia? Many users don’t know how easy it is for an attacker to target Bluetooth.more »
nUbuntu Security Tools Security testing with nUbuntuJun 30, 2008
Study your network’s defenses with the Ubuntu-based nUbuntu security testing distribution.more »
Expert Security Intro Staying one step ahead of the intrudersMay 31, 2008
Internet intruders have many ingenious ways of escalating privileges and hiding their presence once they get inside your system. The best protection is to keep them out in the cold.more »
A full-fledged Linux computer on a USB stick: Yoggie uses this astonishing hardware trick to protect Windows machines against Web-based attacks. But there are some things that do not work as intended by the developers as an exhaustive test in Linux Magazine #94 / September will reveal. Just a few simple tricks were all it took to work around the firewall.more »
Nagios Workshop Watching your systems with NagiosMay 29, 2008
Nagios monitors your network and provides early warning for problems with hosts and services.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm