Security Lessons – Hash Maps Security with data structuresJan 23, 2013
What do all programs have in common? They store data at some point, usually in arrays – everything from commandline options to the input and output. But how is data actually stored by the program? Kurt explains.more »
- OpenShift for data centers and clouds
- MariaDB non-profit foundation launched
- Fedora 18 to include Mate desktop
- Oracle repository for kernel changes
- NVidia GeForce R310
- Android OS leads the smartphone market
- Microsoft contemplating yearly major release cycle
- HP writes off US$ 8.8 million on Autonomy
- Stallman alleges “surveillance code” in Unity
Security Lessons: Secure Backup Back up your systems securelyDec 19, 2012
Creating backups is one thing, making sure they’re secure is another. We offer some tips for ensuring the process is as painless as possible.more »
IPv6 Penetration Testing Pen testing on IPv6 networks: In Through the Back DoorDec 17, 2012
If you have enabled IPv6 on your network without considering basic security issues, you might have opened up a hole for attackers. In this article, we demonstrate a successful attack on a server via IPv6 and explain how the popular security tools handle IPv6.more »
Tails Secure Distro Amnesiac IncognitoDec 04, 2012
These days, security and privacy issues are increasingly making the news, but where can the average free software user learn more about safer practices? One of the best answers I have found is Tails, a Debian-based distribution that seems as much about teaching users to make informed decisions as about the software itself.more »
Security Lessons: auditd Configuring and using auditdNov 26, 2012
The auditd tool can provide system logging capabilities to satisfy even the most paranoid users.more »
Researchers at Sandia National Laboratories have built a self-contained, Android-based network to study cyber disruptions and help secure hand-held devices.more »
Citrix announces version 6.1 of XenServer – a complete server virtualization platform built on the open source Xen hypervisor.more »
The Internet community officially banishes the notoriously unsafe Secure Sockets Layer protocol.
Popular desktop environment continues the Gnome 2 legacy – with new support for the Gnome 3 toolkit.
New program will dial up security for the Firefox browser.
Red Hat's community distro embraces the cloud.
New partnership will bring more and better CS training to US schools
Criminals offer online help over Tor network
Sophisticated malware is still present on Joomla and WordPress sites around the world.
New release marks the arrival of AMD’s unified driver strategy.