Resetting Passwords with SystemRescueCd Resetting passwords with a Live Linux systemJun 21, 2012
If you’re locked out of your Linux or Windows system, a handy Live Linux troubleshooting distro might be all you need to get back in. We’ll show you how to pick the lock with SystemRescueCd.more »
Security Lessons: Capabilities A life of privilegeJun 21, 2012
Granting root access, even temporarily, is rife with danger. Capabilities could help.more »
UEFI and Secure Boot No Free BootsJun 20, 2012
The imminent Windows 8 implementation of UEFI with Secure Boot adds an extra layer of complexity for some Linux users. We look at the problem and two solutions from Fedora and Canonical.more »
SUSE Linux Enterprise Server 11 SP2 offers major improvements in performance, security, and hardware support.more »
SEAndroid SEAndroid brings better security to Android devicesMay 29, 2012
The still experimental but promising SEAndroid framework offers SELinux-like mandatory access control for the Android universe.more »
Security Lessons: Hacking Hardware Don’t forget your hardwareMay 29, 2012
Now that your networks are secure and you’ve convinced your users to secure their passwords and software, it’s time to turn your attention to your hardware to keep it from being attacked.more »
Secure your enterprise, monitor system performance, and more by harnessing the power of Splunk to search, monitor, report, and analyze events and data from any source.more »
For its size, fail2ban, a utility that scans logfiles and bans suspicious IP addresses, punches well above its weight.more »
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.