Introduction The sys admin's daily grind: HttptunnelSep 30, 2009
Just a couple of hours after completing this article, Charly headed off on vacation. Before he left, he indulged in a spot of piercing to help him work around the paranoid firewalls waiting for him in the Internet cafes at his holiday location.more »
Intrusion Prevention Intro Understanding, detecting, and preventing network attacksAug 31, 2009
This month we look into the intruder's toolkit and investigate some prudent counter-measures for detecting and preventing attacks.more »
Security fixes address a few vulnerabilities in Mozilla Thunderbird and SeaMonkey.more »
Ratproxy The Ratproxy security scanner looks for vulnerabilities in web applicationsMar 31, 2009
Google's Ratproxy is a free testing tool that searches for security problems in web applications.more »
At the CanSecWest Vancouver 2009 conference's PWN2OWN hacker's competition the Safari, Internet Explorer 8 and Firefox browsers were successfully hacked to run code on their systems. The Chrome browser was recognized as being the least impacted by the hackers.more »
Security tester ProCheckUp has found critical bugs in Novell's GroupWise WebAccess that could allow e-mail theft.more »
One-Time Passwords on the Web Implementing a one-time password system on the webJan 31, 2009
Add security to your website with a one-time password system.more »
Counterfeit links are able to deceive the Firefox and Chrome browsers, directing users to unintended websites.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm