Steganography and other strategies from the real world

THE SECURITY CHALLENGE

Article from Issue 112/2010
Author(s):

This month we look at hidden data, dastardly PDFs, safer surfing, and tools for better password control.

The Cover Intro online provides an advance look at the cover stories you'll find in our March 2010 issue of Linux Magazine and Linux Pro Magazine. To read all the articles in this issue, look for the magazine on newsstands worldwide in February. This issue ships to subscribers soon – subscribe today!

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Intrusion Prevention Intro

    This month we look into the intruder's toolkit and investigate some prudent counter-measures for detecting and preventing attacks.

  • Windows Integration Intro

    This month we feature some new ideas for Windows integration.

  • Sys admin tools

    This month we check out some new tools and take a closer look at some classic system administration utilities.

  • Device Tricks Intro

    Linux is getting much better at managing devices, and the versatility of open source software leads to some interesting innovations.

  • Java and .NET Intro

    In today's heterogeneous environments, it is hard to escape the influence of Java and .NET. So why not come prepared? This month we examine some tools and techniques for integrating the Java and .NET frameworks with Linux.

comments powered by Disqus