This issue’s DVD comes with the BackTrack 5 R1  pen test distribution. BackTrack provides a great collection of pen testing and security auditing tools. You can boot into BackTrack Live from the DVD or install BackTrack permanently on your hard disk.more »
The Wireshark free network sniffer rolls out 1.6 release with advanced features.more »
Security Lessons: JTAG Hacking Owning your own stuffMay 31, 2011
Who’s device is it? Just because you bought it doesn’t mean you can look inside. But the Internet has plenty of resources for jailbreakers.more »
BackTrack, an Ubuntu-based penetration-testing distribution, offers "major improvements" over previous releases, including support for 32- and 64-bit architectures, KDE 4, Gnome, and Fluxbox.more »
Snort Helpers Snort Helpers: Open Source Network Intrusion DetectionMay 02, 2011
Snort is the de facto standard for open source network intrusion detection. The developer community has kept a fairly low profile for a couple of years, but extensions like Snorby, OpenFPC, and Pulled Pork have given the old hog a new lease on life.more »
Red Hat announces IBM, Accenture, Alfresco, Cisco, HP and Intel representatives are scheduled to deliver keynotes at the seventh annual Red Hat Summit and JBoss World, May 3-6, 2011 in Boston, Massachusetts.more »
OpenNMS OpenNMS: Monitoring large systems and networksMar 30, 2011
If you need to monitor very large networks, you need powerful software. OpenNMS offers serious monitoring capabilities in a truly open source package.more »
Security Lessons Linux security in the cloudMar 28, 2011
Although you give up control of the underlying infrastructure when you use cloud computing, you can still maintain some control over security.more »
New release marks the arrival of AMD’s unified driver strategy.
A new study by IDC charts big changes in the big hardware market.
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?