The special sauce in USMobile, Inc.'s Scrambl3, the mobile app that facilitates
"the world's most private calls and messages", is a set of open-source
components that create a top-secret-grade VPN, encryption algorithms and internet
protocols.
The new version 8.5 of Synopsys' Coverity extends the security umbrella
of the static analysis tool to mitigate a wider range of security
vulnerabilities.
The "5" in Naztech's new Roadstar 5 Car Charger refers to the
abundant five ports offered by the device, intended to end in-vehicle
debates on who gets to charge their device next. Naztech says that its new
charger delivers superior charging power and speed while protecting tablet
and smartphone batteries and motherboards.
At some point, you probably have installed or configured a piece of
software on a server or desktop PC. Since you read Linux
Journal, you've
probably done a lot of this, as well as developed a range of glue shell
scripts, Perl snippets and cron jobs.
I love Linux, and if you're reading this, chances are you do too. To be
honest though,
some aspects of the Linux environment are confusing.
Near the top of the list for me is the profile system.
With more and more businesses running on the Node.js server-side JavaScript
runtime environment, application vulnerabilities are a growing threat to
entire organizations.
This is the first in a multipart series on Qubes OS, a security-focused
operating system that is fundamentally different from any other Linux
desktop I've ever used and one I personally switched to during the past
couple months.
Servers are generated – often with a ‘golden master’ and then left never to be checked or examined from a security perspective. This session discusses the ways the server settings can degrade, the undesirable effects this may have on your organization and how you can avoid both.