Expert analysis
“Expert vs. Expertise” – Computer Forensics and the Alternative OS
No longer a dark and mysterious process, computer forensics have been significantly on the scene for more than five years now. Despite this, they have only recently gained the …
Interview with Michael Jang, author of “Mastering Red Hat Linux 9”
Michael Jang, RHCE, Linux+, LCP, specializes in books on Linux and Linux certification. His experience with computers goes back to the days of jumbled punch cards. He’s …
Apache 1.3.28 has Been Released
The Apache Group released version 1.3.28 of the Apache HTTP Server. This version of Apache is principally a security and bug fix release. Of particular note is that 1.3.28 …
Black Hat Briefings 2003 Keynote Speakers Announced
Black Hat Inc. announced the keynote speakers for this summer’s Black Hat Briefings and Training 2003, the annual conference and workshop designed to help computer …
An Overview of Issues in Testing Intrusion Detection Systems
While intrusion detection systems are becoming ubiquitous defenses in today’s networks, currently we have no comprehensive and scientifically rigorous methodology to …
Interview with Rafeeq Ur Rehman, author of “Intrusion Detection with SNORT”
Who is Rafeeq Ur Rehman? Introduce yourself to our readers. I am working as Managing Consultant at Dedicated Technologies Inc. where we provide services related to enterprise …
Changing The Game
The Internet age has heralded unprecedented opportunities. How else could we have created, and benefited from, the global marketplace that we now all operate within? But with …
AirDefense launches solution to secure and support wireless LANs with 24×7 monitoring for rogue detection & policy enforcement
AirDefense introduced its AirDefense Guard 1120 as an entry-level solution to provide the highest level of security and support for enterprise wireless LANs at an affordable …
MIT Kerberos 5 Release 1.3 Announced
The MIT Kerberos Team announced the availability of MIT Kerberos 5 Release 1.3. Kerberos 5 Release 1.3 source can be retrieved from …
21st Century Infamous Competitions
As all true fans of Westerns know, any bad guy worth his salt will have a score of notches marked on the butt of his revolver: each notch symbolizing another tombstone …
Trustix Secure Linux 2.0 Announced
After a number of technology preview (announcements: TP1 and TP2) and beta versions (announcements: Beta 2 and Beta 3), Trustix Secure Linux announced the release of Trustix …
Sony alerts consumers of fraudulent spam e-mail
Sony Electronics reported that it has become aware of an unauthorized and deceptive spam e-mail that has been sent to consumers with the subject title “Sonystyle user …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025