The Tor project provides an Orbot package for Android mobile phones so that they too can access the Tor anonymity network.more »
FCC's authority called into questionmore »
Steganography Intro Steganography and other strategies from the real worldJan 26, 2010
This month we look at hidden data, dastardly PDFs, safer surfing, and tools for better password control.more »
The Mozilla Firefox 3.6 browser is now available and provides performance improvements and numerous technical enhancements.more »
Microsoft has decided to issue a special patch outside its usual patchday rhythm for all its Internet Explorer versions to close a severe vulnerability issue. Downloads of Firefox have accordingly skyrocketed.more »
The Apache Foundation had its big conference November 2-6 in Portland OR and Linux Pro Magazine was there with its camera. To celebrate the ten-year anniversary of the foundation, some highlights from the comprehensive program of talks are available for free in our video archives now.more »
Introduction The sys admin's daily grind: HttptunnelSep 30, 2009
Just a couple of hours after completing this article, Charly headed off on vacation. Before he left, he indulged in a spot of piercing to help him work around the paranoid firewalls waiting for him in the Internet cafes at his holiday location.more »
Intrusion Prevention Intro Understanding, detecting, and preventing network attacksAug 31, 2009
This month we look into the intruder's toolkit and investigate some prudent counter-measures for detecting and preventing attacks.more »
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.