Please turn on your JavaScript for this page to function normally.
December brings hackers to Malaysia

As the organizers note, the main aim of the Hack In The Box Security Conference 2003 is the dissemination, discussion and sharing of network security information. It’s …

New Service Helps Enterprise IT Address Endpoint Vulnerabilities

iPass announced its new iPass Endpoint Policy Management service. This new service helps the IT department stay out in front of threats to the corporate network caused by …

Interview with Arne Vidstrom, techical editor of the “HackNotes Windows Security Portable Reference”

Who is Arne Vidstrom? Introduce yourself to our readers. I’m a 29 years old Swedish security reseacher who run the web site ntsecurity.nu, where I publish a collection …

HackNotes Windows Security Portable Reference

If you want to learn more about Windows security, there's a plethora of security books out there you can use. Most of these titles are large volumes that contain information …

RSA Security Supports Microsoft Security Initiatives

RSA Security offered support for Microsoft Corp.’s newly announced enhanced security initiatives, including a commitment to continued product development and industry …

Interview with Jamie Cameron, author of “Managing Linux Systems with Webmin”

Who is Jamie Cameron? Introduce yourself to our readers. I’m Australian, 29 years old, and have been interested in or working with computers and programming since I got …

Interview with Jason Reid, author of “Secure Shell in the Enterprise”

Jason Reid is a Member of Technical Staff with Sun Microsystems. There he tests software and writes for the Sun BluePrints program. His start in security began as a Unix …

Linux Security Cookbook

If you work with Linux you certainly know of many resources where you can get your questions answered when running into a problem. When it comes to securing your Linux box, …

New Automated 802.11 Wireless Security Software From Code Red Systems

A limited free download of the AirBlock 802.11 wireless security software for residential and small business networks has been made available by Code Red Systems, a provider …

Red Hat Linux Administration: A Beginner’s Guide

There are many books dedicated to Linux system administration. The one I'm taking a look at today is written specifically for Red Hat Linux although much of the material can …

Interview with Mohammed J. Kabir, author of the “Red Hat Linux Survival Guide”

Mohammed J. Kabir (prefers to be called Kabir) is the founder and CEO of EVOKNOW, Inc. His company, EVOKNOW, develops email and GIS software. Kabir also leads a consulting …

Windows Server 2003 Security Bible

This book is a perfect choice for all you administering Windows Server 2003 machines as it deals exclusively with security. There's so much to learn and I believe the author …

Don't miss

Cybersecurity news