PHP Security Principles Seven principles for preventing vulnerabilities in PHP programmingOct 26, 2012
Many web attacks are the result of programmer error. Sloppy code testing leaves a door open for the uninvited.more »
Testing Password Quality Creating secure passwords and testing their qualityOct 09, 2012
Create secure passwords with the help of a password generator and check for quality at the same time.more »
ownCloud Build your personal cloud servicesMar 01, 2012
Own the Cloud: Set up your own personal cloud server with ownCloud.more »
Security Lessons: Web Apps Web Development – one day we’ll get it rightNov 02, 2011
A few tools and tricks can find and correct web app vulnerabilities.more »
Snort Helpers Snort Helpers: Open Source Network Intrusion DetectionMay 02, 2011
Snort is the de facto standard for open source network intrusion detection. The developer community has kept a fairly low profile for a couple of years, but extensions like Snorby, OpenFPC, and Pulled Pork have given the old hog a new lease on life.more »
Security Lessons: Bufferbloat Will cheap RAM break the Internet?Apr 29, 2011
An abundance of buffers hides the Internet’s dirty little secret.more »
Red Hat announces IBM, Accenture, Alfresco, Cisco, HP and Intel representatives are scheduled to deliver keynotes at the seventh annual Red Hat Summit and JBoss World, May 3-6, 2011 in Boston, Massachusetts.more »
A security advisory warning has been issued by Adobe for a critical vulnerablity in its Flash Player 10.2.153.1 and more.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm