Coworkers at the University of Tel Aviv have presented a prototype for a new host-based intrusion detection system (HIDS) for Linux. Named Korset, it uses static code analysis and promises zero failures.more »
According to a report from Reuters, trading at the London Stock Exchange came to a standstill for seven hours because of computer problems on Monday.more »
Trackbacks in Drupal Configuring Trackbacks in DrupalAug 31, 2008
Trackbacks offer a simple means for bloggers to connect and share information.more »
RadialNet Visualizing your network with RadialNetAug 31, 2008
RadialNet draws a picture of the network, helping admins identify potential security holes.more »
Google's software for mobile communication, Android, is scheduled for release in November along with the Dream ''GPhone."more »
TorK Configuring the Tor network with TorKJul 31, 2008
If you're worried about eavesdroppers, connect to the Tor network with KDE's handy TorK configuration tool.more »
Tuning WLAN Routers Customizing your home router with OpenWrtJul 31, 2008
Learn how to take control of your home routing device with OpenWrt.more »
Charly's Column The Sysadmin’s Daily Grind: PostfilterJul 11, 2008
If protocols were human beings, NNTP would be a kind and slightly confused person that always believes the best of other people – even if they drop trash in the mailbox. Postfilter gives NNTP a watchdog.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.