Home Search
crack - search results
If you're not happy with the results, please do another search
Review of ‘High-Tech Crimes Revealed’
TBR writes "The most interesting and readable accounts of IT security are written by protagonists - from either side of the IT security fence....
Linux Advisory Watch – October 8, 2004
Author: Preston St. Pierre
This week, advisories were released
for syscons, shareutils, netpbm, kdelibs, PHP, samba, kernel, XFree86, samba,
getmail, zlib,...
How to install a simple network gateway
Author: Aditya Nag
This HOWTO is aimed at first time Linux users who want to set up a Linux box as a gateway to the...
The Future Of Infosec
Kelly McNeill writes "Because software is potentially infinitely foul-able it can be said that it is also infinitely insecure. Though cracks in the system...
Mobile Data and Insecurity
Chuck Talk writes "The Internet brings us rapid access to data, so much so that with that access, we often forget that the physical...
Managed services company finds greater speed, power, and savings with Linux
Author: Tina Gasperson
Remember application service providers? Back in 1999, Jamcracker was one of the first companies to focus solely on providing consumable application services....
Dear one-browser Web designers: Don’t say I didn’t warn you
Author: Robin 'Roblimo' Miller
In my 2002 book, The
Online Rules of Successful Companies, I said it was stupid to design
Web sites that would...
Users care about data, not software
Author: Nathan Willis
A couple of weeks ago I wrote an article explaining how to migrate your email and addressbook from Ximian Evolution to Mozilla...
Hardening the PAM framework
In yesterday's article we began looking at how PAM can securely authenticate Windows users. Today we'll check the PAM framework, harden the basic services...
HP’s NX5000 Linux notebook: A breach of the Windows wall?
Author: Joe Barr
This article is supposed to be a review of the first PC with a Linux distribution preloaded offered by a tier-one OEM...