The Tor project provides an Orbot package for Android mobile phones so that they too can access the Tor anonymity network.more »
FCC's authority called into questionmore »
Steganography Intro Steganography and other strategies from the real worldJan 26, 2010
This month we look at hidden data, dastardly PDFs, safer surfing, and tools for better password control.more »
The Mozilla Firefox 3.6 browser is now available and provides performance improvements and numerous technical enhancements.more »
Microsoft has decided to issue a special patch outside its usual patchday rhythm for all its Internet Explorer versions to close a severe vulnerability issue. Downloads of Firefox have accordingly skyrocketed.more »
The Apache Foundation had its big conference November 2-6 in Portland OR and Linux Pro Magazine was there with its camera. To celebrate the ten-year anniversary of the foundation, some highlights from the comprehensive program of talks are available for free in our video archives now.more »
Introduction The sys admin's daily grind: HttptunnelSep 30, 2009
Just a couple of hours after completing this article, Charly headed off on vacation. Before he left, he indulged in a spot of piercing to help him work around the paranoid firewalls waiting for him in the Internet cafes at his holiday location.more »
Intrusion Prevention Intro Understanding, detecting, and preventing network attacksAug 31, 2009
This month we look into the intruder's toolkit and investigate some prudent counter-measures for detecting and preventing attacks.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.