Mirko Zorz
Interview with John Chirillo, author of “Hack Attacks Testing: How to Conduct Your Own Security Audit”
Who is John Chirillo? How did you gain interest in computer security? Like most computer enthusiasts I began my career early on. At twelve years old I wrote a game entitled …
Interview with Mark G. Sobell, author of “A Practical Guide to Red Hat Linux 8”
Mark G. Sobell is the author of best-selling UNIX and Linux books: “A Practical Guide to the UNIX System”, “UNIX System V: A Practical Guide”, “A …
LT Auditor+ Security Software Bundled with Novell Netware
Blue Lance announced that a new version of LT Auditor+ has been developed exclusively for Novell and packaged with “Nakoma,” the next official release of NetWare. …
Interview with Sunil James, Manager of iDEFENSE’s Vulnerability Contributor Program
Sunil James manages iDEFENSE’s Vulnerability Contributor Program (VCP). He is a member of the company’s Technical Intelligence team. Sunil joined iDEFENSE in July …
Red Hat Linux 9 has been released
Red Hat, Inc. announced the availability of Red Hat Linux 9. Drawing from the work of the open source community, Red Hat Linux 9 allows users to take advantage of the newest …
Interview with Lisa Yeo, author of “Personal Firewalls for Administrators and Remote Users”
Lisa Yeo is a systems analyst with the Legislative Assembly Office in Edmonton, Alberta, Canada. Her start in security came in 1997 when she was made responsible for managing …
Interview with Scott Mann, co-author of Linux System Security: The Administrator’s Guide to Open Source Security Tools, 2/e
Who is Scott Mann? I am a computer jockey by profession. I’ve been working with UNIX and TCP/IP for nearly 25 years. Windows for 8 years. I’m also a sometime auto …
Interview with Christopher Negus, author of “Red Hat Linux 8 Bible”
Christopher Negus has been working with UNIX systems, the Internet, and (more recently) Linux systems for more than two decades. During that time, Chris worked at AT&T …
Three-Day Virtual Conference on Remote Access, VPN and Web Application Security
Rainbow Technologies announced that a trio of security experts will participate in multiple panel discussions ranging from remote access deployments to virtual private network …
Red Hat Linux 8 Bible
As Linux gains more and more popularity we have books on the subject being published frequently. This is one of the latest books on Red Hat Linux 8 that, as all books do, …
Maximum Security 4/e
When you're about to read a book that already reached its fourth edition, you know you're about to embark on an interesting journey. Since it's debut in 1997, the Maximum …
Interview with Steve Kalman, Managing Director for Esquire Micro Consultants
Who is Steve Kalman? I’ve been in MIS since 1968, when I learned to program in Fortran at Ohio State University. Over the years I’ve been a programmer, systems …
Featured news
Resources
Don't miss
- Eyes, ears, and now arms: IoT is alive
- What’s worth automating in cyber hygiene, and what’s not
- Want faster products and stronger trust? Build security in, not bolt it on
- DDoS attacks jump 358% compared to last year
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)