ownCloud Build your personal cloud servicesMar 01, 2012
Own the Cloud: Set up your own personal cloud server with ownCloud.more »
Security Lessons: Web Apps Web Development – one day we’ll get it rightNov 02, 2011
A few tools and tricks can find and correct web app vulnerabilities.more »
Snort Helpers Snort Helpers: Open Source Network Intrusion DetectionMay 02, 2011
Snort is the de facto standard for open source network intrusion detection. The developer community has kept a fairly low profile for a couple of years, but extensions like Snorby, OpenFPC, and Pulled Pork have given the old hog a new lease on life.more »
Security Lessons: Bufferbloat Will cheap RAM break the Internet?Apr 29, 2011
An abundance of buffers hides the Internet’s dirty little secret.more »
Red Hat announces IBM, Accenture, Alfresco, Cisco, HP and Intel representatives are scheduled to deliver keynotes at the seventh annual Red Hat Summit and JBoss World, May 3-6, 2011 in Boston, Massachusetts.more »
A security advisory warning has been issued by Adobe for a critical vulnerablity in its Flash Player 10.2.153.1 and more.more »
Intrusion Detection Platform-independent and extensible IDS with PreludeMar 23, 2011
The Prelude security information management system receives both host- and network-based IDS messages and displays them in an easy web interface. We show you how to set it up.more »
Security Lessons: HTML5 HTML5 – Building a better botnetJan 31, 2011
New web technologies address shortcomings in web browsers but create new problems as well.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.