LinuxSecurity.com Feature Extras:
Book Review: Linux Kernel Programming - As Linux is implemented on increasingly wider number of devices, the number of people responsible for developing and maintaining Linux on those platforms have increased. As the level of maturity of the kernel increases, so does the complexity, capabilities, and size. This book provides the Linux programmer the tools necessary to understand the core aspects of the kernel and how to interface with it.
What You Need to Know About Linux Rootkits - Rootkits are a way attackers hide their tracks and keep access to the machines they control. The good rootkits are very hard to detect and remove. They can be running on ones computer and no one can even know they have been running. Read more to learn how to detect them on your system.
|
||
SSH tunneling for secure web surfing (Apr 5) | ||
|
||
Popular open source DHCP program open to hack attacks (Apr 7) | ||
|
||
Comodo hack may reshape browser security (Apr 4) | ||
|
||
(Apr 5) | ||
|
||
(Apr 6) | ||
|
||
(Apr 7) | ||
|
||
(Apr 7) | ||
|
||
Wrap Firefox in a Cocoon of privacy (Apr 6) | ||
|
||
(Apr 7) | ||
|
||
(Apr 5) | ||
|
||
Security firms learns limits of security tech (Apr 7) | ||
|
||
Google Chrome 12 Protects Against Malware (Apr 8) | ||
|