Examples of "shred" usage on a fresh install of Ubuntu 8.04.1
blog.wired.com: The Massachusetts Bay Transportation Authority filed a suit in federal court on Friday seeking a temporary restraining order to prevent three undergraduate students from the Massachusetts Institute of Technology from presenting a talk at the DefCon hacker conference this weekend about security vulnerabilities in payment systems used in the Massachusetts mass transit system.
A tutorial on howto setup Metasploit, a tool for exploit testing, IDS, and pen testing.
How A rootkit Exactly Works — Explaination and dissection of the dica rootkit (a variant of the t0rn rootkit).
mylro.org: Linux and UNIX-like operating systems in general are regarded as being more secure for the common user, in contrast with operating systems that have "Windows" as part of their name. Why is that?
[M]alware includes not just virii, but worms, trojans and root-kits. These known and widely available tools are not the only options available to intruders either. GNU/Linux users should not have any false sense of security just based on the fact that viruses designed for exclusively for windows won't run on GNU/Linux.
Whether you are online or offline, freedom matters. Like good health you never think about it or miss it until it is under threat or actually gone. If you love freedom, you probably love free software and it has given us some terrific tools with which to defend freedom. In this article I will give an overview of some of the available resources (Freenet, Wikileaks and Tor) to protect dissident opinion, facilitate whistle blowing and promote the safe and anonymous development of free software.
blog.wired.com: In passing the FISA Amendments Act, US Congress gave the executive branch the power to order Google, AT&T and Yahoo to forward to the government all e-mails, phone calls and text messages where one party to the conversation is thought to be overseas.
cnet.com: Less than one day after its launch, Firefox 3 has a vulnerability. According to Tipping Point's Zero Day Initiative, the vulnerability, which it rates as critical, was reported within the first five hours of Firefox 3's release.
In recent history, journaling file systems were viewed as an oddity and thought of primarily in terms of research. But today, a journaling file system (ext3) is the default in Linux®. Discover the ideas behind journaling file systems, and learn how they provide better integrity in the face of a power failure or system crash. Learn about the various journaling file systems in use today, and peek into the next generation of journaling file systems.