Security

Building a Transparent Firewall with Linux, Part IV

Arm your stealth firewall with a custom iptables script. more>>

Hack and / - Some Hacks from DEF CON

What happens when a sysadmin goes to a hacker conference? He gets a fresh perspective on computer security. more>>

Building a Transparent Firewall with Linux, Part III

Hack your cheap wireless gateway into a stealth firewall. more>>

Web Application Security Testing with Samurai

Web site vulnerabilities often occur in very non-obvious ways. Whether you're a Web developer or run a Web site, you need to understand how it's done and how to test your site. more>>

Linux Distribution: Lightweight Portable Security

Lightweight Portable Security is a LiveCD distro designed by the US Department of Defense to function as a secure end node, in other words, a safe environment from which to access the web or a remote desktop host. The focus is on security, and for this reason, it boots from a CD and executes from RAM, providing a web browser, a file manager and a few other small tools. more>>

firewall

Paranoid Penguin - Building a Transparent Firewall with Linux, Part I

Yes, you still need a firewall. How about a transparent one? more>>

Paranoid Penguin - Linux VPNs with OpenVPN, Part V

Tips for success in using OpenVPN for secure remote access. more>>
Security

Security vs. Convenience

Although my intent is not to start the next GNOME/KDE-level war, it seems there must be a happy medium between total desktop insecurity and total desktop unusability. Linux offers so many ways to secure data that it's important to realize it's okay for folks to have different needs and desires. Sure, there are some basic security measures we all should take—things like: more>>

Paranoid Penguin - Linux VPNs with OpenVPN, Part IV

Use dangerous local-area networks without fear with OpenVPN. more>>

Senator Moves To Form Federal "Cyber-Emergency" Agency

Though most of us would admit we get a bit jumpy when our internet connection goes on the fritz, it's unlikely that many could call it an emergency. The potential for a massive cyber-emergency is on the mind of at least one Senator, however, who wants to give the President the power to "protect" us against an internet crisis. more>>

Google Search will now come with an Encrypted version

In the blog post that Google published regarding its collecting of WiFi data, Alan Eustace, Senior VP, Engineering & Research at Google made an announcement that many seem to have not noticed due to the much more important main issue. However, it is still interesting nonetheless. more>>

Using Linux to Disinfect Windows

Are you responsible for one or more Windows computers? If yes then the odds are really good that you have had to deal with cleaning viruses and malware. Did you know F-Secure offers a free Rescue CD built on Knoppix for just this purpose? Let's take a look at how easy the F-Secure Rescue CD is to use. more>>

Paranoid Penguin - Linux VPNs with OpenVPN, Part III

Secure remote networking, the OpenVPN way. more>>
Syndicate content
Free Dummies Books
Continuous Engineering

Learn:

  • What continuous engineering is
  • How to continuously improve complex product designs
  • How to anticipate and respond to markets and clients
  • How to get the most out of your engineering resources

Get your free book now

Sponsored by IBM

Free Dummies Books
Service Virtualization

Learn to:

  • Define service virtualization
  • Select the most beneficial services to virtualize
  • Improve your traditional approach to testing
  • Deliver higher-quality software faster

Get your free book now

Sponsored by IBM