Coworkers at the University of Tel Aviv have presented a prototype for a new host-based intrusion detection system (HIDS) for Linux. Named Korset, it uses static code analysis and promises zero failures.more »
According to a report from Reuters, trading at the London Stock Exchange came to a standstill for seven hours because of computer problems on Monday.more »
Trackbacks in Drupal Configuring Trackbacks in DrupalAug 31, 2008
Trackbacks offer a simple means for bloggers to connect and share information.more »
RadialNet Visualizing your network with RadialNetAug 31, 2008
RadialNet draws a picture of the network, helping admins identify potential security holes.more »
Google's software for mobile communication, Android, is scheduled for release in November along with the Dream ''GPhone."more »
TorK Configuring the Tor network with TorKJul 31, 2008
If you're worried about eavesdroppers, connect to the Tor network with KDE's handy TorK configuration tool.more »
Tuning WLAN Routers Customizing your home router with OpenWrtJul 31, 2008
Learn how to take control of your home routing device with OpenWrt.more »
Charly's Column The Sysadmin’s Daily Grind: PostfilterJul 11, 2008
If protocols were human beings, NNTP would be a kind and slightly confused person that always believes the best of other people – even if they drop trash in the mailbox. Postfilter gives NNTP a watchdog.more »
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems