Charly's Column The Sysadmin’s Daily Grind: TorNov 01, 2005
Some people don’t mind leaving traces of their IP address wherever they go, others prefer to use a tool like The Onion Router.more »
Java Anonymous Proxy Anonymous surfing with Java Anonymous ProxyNov 01, 2005
Many Websites log IP addresses and access times to identify users. If you don’t want to wind up as data in someone’s market research, the Java Anonymous Proxy will keep your surfing secret.more »
Squid proxy server Implementing a home proxy server with SquidNov 01, 2005
A proxy server provides safer and more efficient surfing. Although commercial proxy solutions are available, all you really need is Linux and an old PC in the attic.more »
XSA Attack Stopping the cross-site authentication attackNov 01, 2005
A new form of phishing attack deposits an HTML tag on the vulnerable service to trap users into authenticating.more »
Web Filters Privoxy and Webcleaner content filtersOct 01, 2005
Content filters protect a web user’s privacy and keep the flood of unsolicited advertising at bay. We’ll show you a pair of popular Open Source content filters.more »
Socks 5 Examining the generic Socks version 5 proxy protocolJul 01, 2005
Socks is a universal proxy protocol for TCP and UDP that allows internal hosts to securely pass the firewall and authenticates users. This article describes the latest version of the Socks proxy protocol and shows how to implement it.more »
Anonymous Email Anonymous Remail with MixmasterMay 01, 2005
Anonymous remail protects the sender’s identity against potential eavesdroppers. The Mixmaster protocol gives users a mature technology for anonymous remail, and the text-based Mixmaster client is an example of a free remailer application.more »
Admin Workshop Identd Insider Tips: Identd with Linux-based ServersApr 01, 2005
In last month’s issue of Admin Workshop, we introduced tools that help admins get services up and running. This month, we will show how you can use the Ident protocol to associate a user name with a TCP connection.more »
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.