Table of Contents: 148 What's inside the March 2013 issueJan 23, 2013
Science fiction authors and high-tech visionaries dream of a future where humans and computers communicate in ordinary English. A new cloud-based tool brings that future a little closer.more »
Security Lessons – Hash Maps Security with data structuresJan 23, 2013
What do all programs have in common? They store data at some point, usually in arrays – everything from commandline options to the input and output. But how is data actually stored by the program? Kurt explains.more »
- OpenShift for data centers and clouds
- MariaDB non-profit foundation launched
- Fedora 18 to include Mate desktop
- Oracle repository for kernel changes
- NVidia GeForce R310
- Android OS leads the smartphone market
- Microsoft contemplating yearly major release cycle
- HP writes off US$ 8.8 million on Autonomy
- Stallman alleges “surveillance code” in Unity
Security Lessons: Secure Backup Back up your systems securelyDec 19, 2012
Creating backups is one thing, making sure they’re secure is another. We offer some tips for ensuring the process is as painless as possible.more »
IPv6 Penetration Testing Pen testing on IPv6 networks: In Through the Back DoorDec 17, 2012
If you have enabled IPv6 on your network without considering basic security issues, you might have opened up a hole for attackers. In this article, we demonstrate a successful attack on a server via IPv6 and explain how the popular security tools handle IPv6.more »
Tails Secure Distro Amnesiac IncognitoDec 04, 2012
These days, security and privacy issues are increasingly making the news, but where can the average free software user learn more about safer practices? One of the best answers I have found is Tails, a Debian-based distribution that seems as much about teaching users to make informed decisions as about the software itself.more »
Security Lessons: auditd Configuring and using auditdNov 26, 2012
The auditd tool can provide system logging capabilities to satisfy even the most paranoid users.more »
Researchers at Sandia National Laboratories have built a self-contained, Android-based network to study cyber disruptions and help secure hand-held devices.more »
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems