Safer Surfing Staying ahead of Internet snoopers and con menMay 31, 2006
Do you know enough to surf free of the liars and spies? We’ll show you how to stay ahead of the traps.more »
Tor and Privoxy Anonymous surfing with Tor and PrivoxyMay 31, 2006
Internet users typically reveal their IP addresses, and this lets companies compile a profile of your Internet activities. Tor and Privoxy can help protect your privacy.more »
AppArmor Hardening systems with AppArmorApr 30, 2006
After penetrating a remote system, intruders might think they are home and dry, but AppArmor spoils the fun, locking the miscreants in a virtual cage.more »
Nmap Methods Understanding Nmap analysis techniquesDec 31, 2005
How does the popular Nmap scanner identify holes in network security? In this article, we examine some Nmap analysis techniques.more »
Charly's Column The Sysadmin’s Daily Grind: TorOct 31, 2005
Some people don’t mind leaving traces of their IP address wherever they go, others prefer to use a tool like The Onion Router.more »
Java Anonymous Proxy Anonymous surfing with Java Anonymous ProxyOct 31, 2005
Many Websites log IP addresses and access times to identify users. If you don’t want to wind up as data in someone’s market research, the Java Anonymous Proxy will keep your surfing secret.more »
Squid proxy server Implementing a home proxy server with SquidOct 31, 2005
A proxy server provides safer and more efficient surfing. Although commercial proxy solutions are available, all you really need is Linux and an old PC in the attic.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.