Make your Ada code live up to the language's elegant name with AdaCore's new CodePeer, a source code analysis tool that detects runtime and logic errors in Ada programs. As a code reviewer, CodePeer identifies constructs that are likely to lead to runtime errors, such as buffer overflows, and flags legal but suspect code typical of logic errors. Additionally, AdaCore says that its tool goes “beyond the capabilities of typical static analysis tools”, producing a detailed analysis of each subprogram, including pre- and postconditions, which allows for early detection of potential bugs and vulnerabilities. CodePeer can be used both during system development or as part of a systematic code review process. Finally, it can be used either as a standalone tool or fully integrated into the GNAT Pro Ada development environment.
First there were seven brides for seven brothers, and now there are seven tech books for seven strains of security geek—all courtesy of Syngress. The publisher is promising a whopping seven books in the Seven Deadliest Attacks Series, each with its own focus on a specific type of security breach. The titles include: Seven Deadliest Microsoft Attacks by Rob Kraus, Brian Barber, Mike Borkin and Naomi Alpern; Seven Deadliest Network Attacks by Stacy Prowell, Rob Kraus and Mike Borkin; Seven Deadliest USB Attacks by Brian Anderson and Barbara Anderson; Seven Deadliest Wireless Technologies Attacks by Brad Haines; Seven Deadliest Social Network Attacks by Carl Timm and Richard Perez; Seven Deadliest Web Application Attacks by Mike Shema; and (almost there) Seven Deadliest Unified Communications Attacks by Dan York. Each book covers the anatomy of the seven respective attacks, as well as how to get rid of and defend against them.
Keep the burglars at bay with SoleraTec's new and improved Phoenix RSM, an overarching forensic video surveillance management system. The RSM part stands for Phoenix's Record, Store and Manage capabilities. Other product capabilities include searches in video surveillance environments; incrementally scalable three-medium (hard disk, digital computer tape and optical) on-line and off-line multitier storage; and unlimited retention and support for an unlimited number of cameras, servers and users. Furthermore, video from all connected cameras can be reviewed, investigated and exported with client tools that run on Windows, Linux and Mac OS. Features added to the new version include one-step centralized camera configuration, simplified camera policy management and support for QuickTime and VLC media players.
Waspmote from Libelium is a modular platform for wireless sensor networks that enables environmental monitoring in adverse conditions and remote locations with its radio range of up to 40km. The sensors are intended for deployment in fire and flood detection and other environmental monitoring applications. Waspmote networks can communicate to the external world via GPRS or in situations with very difficult wireless connectivity, such as mines. Each sensor device can store more than 21 million different sensor measurements in its internal memory. Waspmote's four power modes—on, sleep, deep sleep and hibernation—enable a device to function for up to three years without recharging the battery, while a small solar panel can allow it to run indefinitely. Special boards that enable detection of gases and physical events (such as pressure, impact, vibration, temperature and so on) can be integrated. Open-source API and programming environment are available.
James Gray is Products Editor for Linux Journal
Win an iPhone 6
Enter to Win
|Non-Linux FOSS: Install Windows? Yeah, Open Source Can Do That.||Nov 24, 2015|
|Cipher Security: How to harden TLS and SSH||Nov 23, 2015|
|Web Stores Held Hostage||Nov 19, 2015|
|diff -u: What's New in Kernel Development||Nov 17, 2015|
|Recipy for Science||Nov 16, 2015|
|Firefox's New Feature for Tighter Security||Nov 13, 2015|
- Non-Linux FOSS: Install Windows? Yeah, Open Source Can Do That.
- Cipher Security: How to harden TLS and SSH
- Firefox's New Feature for Tighter Security
- How Will the Big Data Craze Play Out?
- Web Stores Held Hostage
- It's a Bird. It's Another Bird!
- Libreboot on an x60, Part II: the Installation
- November 2015 Issue of Linux Journal: System Administration
- diff -u: What's New in Kernel Development
- Strengthening Diffie-Hellman in SSH and TLS