Security Lessons – Hash Maps Security with data structuresJan 23, 2013
What do all programs have in common? They store data at some point, usually in arrays – everything from commandline options to the input and output. But how is data actually stored by the program? Kurt explains.more »
- OpenShift for data centers and clouds
- MariaDB non-profit foundation launched
- Fedora 18 to include Mate desktop
- Oracle repository for kernel changes
- NVidia GeForce R310
- Android OS leads the smartphone market
- Microsoft contemplating yearly major release cycle
- HP writes off US$ 8.8 million on Autonomy
- Stallman alleges “surveillance code” in Unity
Security Lessons: Secure Backup Back up your systems securelyDec 19, 2012
Creating backups is one thing, making sure they’re secure is another. We offer some tips for ensuring the process is as painless as possible.more »
IPv6 Penetration Testing Pen testing on IPv6 networks: In Through the Back DoorDec 17, 2012
If you have enabled IPv6 on your network without considering basic security issues, you might have opened up a hole for attackers. In this article, we demonstrate a successful attack on a server via IPv6 and explain how the popular security tools handle IPv6.more »
Tails Secure Distro Amnesiac IncognitoDec 04, 2012
These days, security and privacy issues are increasingly making the news, but where can the average free software user learn more about safer practices? One of the best answers I have found is Tails, a Debian-based distribution that seems as much about teaching users to make informed decisions as about the software itself.more »
Security Lessons: auditd Configuring and using auditdNov 26, 2012
The auditd tool can provide system logging capabilities to satisfy even the most paranoid users.more »
Researchers at Sandia National Laboratories have built a self-contained, Android-based network to study cyber disruptions and help secure hand-held devices.more »
Citrix announces version 6.1 of XenServer – a complete server virtualization platform built on the open source Xen hypervisor.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.