Help Net Security
Eurephia: Authentication plug-in for OpenVPN
Eurephia is an authentication plug-in for OpenVPN. OpenVPN is a simple but yet powerful application to create secure VPN connections between computers and networks. OpenVPN …
New line of unmanaged networking switches
V7 unveiled a new line of affordable, high-performance networking switches ideal for small or growing networks requiring reliable and affordable performance. V7 8-Port and …
Facebook: The Missing Manual
Facebook’s popularity is skyrocketing, drawing 500 million people to this combination online village green, personal website creator, and souped-up address book. But one …
First advanced virtualization certifications
Virtualization skills are in high demand among IT employers, as companies direct IT budgets to widespread deployment of virtual servers and virtual desktops. Recent studies …
How to unlock the power of cloud computing
Which IT sector accounts for fully 25% of the industry’s year-over-year growth and, if the same growth trajectories continue, will generate about one-third of the IT …
Drive backup for PGP Whole Disk Encryption
Future Systems Solutions announced Casper Secure Drive Backup 2.0 for PGP Whole Disk Encryption, a major update to the only PC backup solution to confront the problems …
Many kids have a negative online experience
Kids around the globe are growing up in an online world, learning to navigate not just the Web, but new rules, emotions and unfortunately, some negative experiences. The …
iSSH: iPhone and iPad SSH client
iSSH is a comprehensive VT100, VT102, VT220, ANSI, xterm, and xterm-color terminal emulator over SSH and telnet, integrated with a tunneled X server and VNC client. iSSH is …
Last chance to get £225 off your RSA Conference Europe registration
RSA Conference Europe 2010 uncovers new threats emerging and how you can contain them. Over three days get the practical knowledge to protect your organization. Choose from …
Hackers: Heroes of the Computer Revolution
This 25th anniversary edition of Steven Levy’s classic book traces the exploits of the computer revolution’s original hackers—those brilliant and eccentric nerds …
20 ways to lose your database
Arguably an organizations’ most vital asset is its databases, often containing sensitive financial information, customer and employee data and intellectual property. …
The top benefits of virtualization
According to a CDW-G report, 77 percent of agencies are implementing at least one form of virtualization, and of those, 89 percent are benefiting from the technology. Benefits …
Featured news
Resources
Don't miss
- The tech that turns supply chains from brittle to unbreakable
- Strix: Open-source AI agents for penetration testing
- Product showcase: SecAlerts – Relevant, actionable, up-to-the-minute vulnerability alerts
- The year ahead in cyber: What’s next for cybersecurity in 2026
- Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims