Please turn on your JavaScript for this page to function normally.
A quick way to secure a Linux system

The first step in securing your system is to determine what the function of that system is going to be. For example, if the system is going to be dedicated to being an ftp …

Using Linux VMware and SMART to Create a Virtual Computer to Recreate a Suspect’s Computer

Since beginning my endeavors with computer forensics, I have always wanted the ability to boot up a suspects computer just to see what the user saw when he was using the …

Securing Online Payments

From the early days of the Internet, credit and charge card companies recognised the enormous opportunities presented to them – but they also saw challenges ahead. …

SSH Demonstrates QuickSec Toolkit Integration With MontaVista Linux

The SSH QuickSec Toolkit Family is specifically designed to let network device developers and OEMs quickly and easily implement IPSec functionality. Optimized and validated …

Iraq Dragged Into The Infamous 419 Scam

Scammers are not just persistent and shameless, but they are opportunistic as well, therefore it is only logical that they would now try to profit from the plight of Iraqis …

Interview with Earl Carter, Member of Cisco’s Security Technologies Assessment Team (STAT)

Who is Earl Carter? I am a security research engineer who is a member of Cisco’s Security Technologies Assessment Team (STAT). Our team examines Cisco products for …

As Predicted the Spam Problem Rages

As the experts have been predicting, the spam problem is growing at alarming rates and poses much more than an annoyance to businesses as it clogs networks and drags down …

Interview with John Chirillo, author of “Hack Attacks Testing: How to Conduct Your Own Security Audit”

Who is John Chirillo? How did you gain interest in computer security? Like most computer enthusiasts I began my career early on. At twelve years old I wrote a game entitled …

Warchalking and Other Wireless Worries

Wireless technologies promise increase flexibility but are the security risks worth the benefits? Wired computer networks are costly to install and difficult to change, …

New Apache 2.0.45 Fixes Denial of Service Vulnerability

Newly released Apache HTTP Server 2.0.45, fixes yet unspecified Denial of Service vulnerability. The vulnerability information will be disclosed by iDefense on 8 April 2003. …

Interview with Mark G. Sobell, author of “A Practical Guide to Red Hat Linux 8”

Mark G. Sobell is the author of best-selling UNIX and Linux books: “A Practical Guide to the UNIX System”, “UNIX System V: A Practical Guide”, “A …

LT Auditor+ Security Software Bundled with Novell Netware

Blue Lance announced that a new version of LT Auditor+ has been developed exclusively for Novell and packaged with “Nakoma,” the next official release of NetWare. …

Don't miss

Cybersecurity news