Home Search

crack - search results

If you're not happy with the results, please do another search

Review of ‘High-Tech Crimes Revealed’

TBR writes "The most interesting and readable accounts of IT security are written by protagonists - from either side of the IT security fence....

Linux Advisory Watch – October 8, 2004

Author: Preston St. Pierre This week, advisories were released for syscons, shareutils, netpbm, kdelibs, PHP, samba, kernel, XFree86, samba, getmail, zlib,...

How to install a simple network gateway

Author: Aditya Nag This HOWTO is aimed at first time Linux users who want to set up a Linux box as a gateway to the...

The Future Of Infosec

Kelly McNeill writes "Because software is potentially infinitely foul-able it can be said that it is also infinitely insecure. Though cracks in the system...

Mobile Data and Insecurity

Chuck Talk writes "The Internet brings us rapid access to data, so much so that with that access, we often forget that the physical...

Managed services company finds greater speed, power, and savings with Linux

Author: Tina Gasperson Remember application service providers? Back in 1999, Jamcracker was one of the first companies to focus solely on providing consumable application services....

Dear one-browser Web designers: Don’t say I didn’t warn you

Author: Robin 'Roblimo' Miller In my 2002 book, The Online Rules of Successful Companies, I said it was stupid to design Web sites that would...

Users care about data, not software

Author: Nathan Willis A couple of weeks ago I wrote an article explaining how to migrate your email and addressbook from Ximian Evolution to Mozilla...

Hardening the PAM framework

In yesterday's article we began looking at how PAM can securely authenticate Windows users. Today we'll check the PAM framework, harden the basic services...

HP’s NX5000 Linux notebook: A breach of the Windows wall?

Author: Joe Barr This article is supposed to be a review of the first PC with a Linux distribution preloaded offered by a tier-one OEM...