A posting from Forbes by Yael Grauer titled “Why Did A Security Firm Mysteriously Ditch a ‘Privacy’ Product?” : Two weeks after Ben Caudill announced that he’d built a $200 hardware proxy which allows Internet users […]
The eForensics team has gathered the most practical articles about Computer Forensics, Network Forensics and Data Recovery from the last three months.
All of the articles have been written by experts in digital forensics industry and are based on their life experiences.
This issue title is “Let’s Play Forensic Tools” […]
I encourage you to have a look at the October issue: Inevitability of IPv6. You will definitely find there some interesting content. Start to read immediately because the November issue is coming soon! […]
The latest issue of BSD magazine is available: Protecting dynamic websites in FreeBSD.
Darrel Levitch has an article about installing and configuring DNSSEC for small networks using Unbound. Then the Developers Corner, which is very PC-BSD oriented this month – with two articles written by Kris Moore and Dru Lavigne focusing how easy it is to update your PC-BSD and how to backup it to FreeNAS with Life Preserver.
The May issue of BSD magazine is out and full of new content. 🙂
We warm up with Michael Hernandez and his Introduction to Z Shell followed by the Developers Corner. There you will find Dru Lavigne’s article about PC-BSD 9.0 Multiple Desktop Support, more DragonflyBSD news from Justin C. Sherrill (including information about new DragonflyBSD 2.10) and an article about „Evolution of an OpenBSD port” by Ian Darwin. […]
Another exciting edition of Hackin9 is out and you can download it here. Information about this edition is located below:
· Wuala – Secure Online Storage
There are a lot of online storage/backup solutions available nowadays and it is hard to find differences between them, but I think Wuala from LACIE may have something unique in the way their solution works. […]
In order to download the magazine you need to sign up to our newsletter. After clicking the “Download” button, you will be asked to provide your email address. You need to verify your email address using the link from the activation email you will receive. If you already subscribed to our list, you will be asked to provide your email address each time you download the magazine. No activation email will be sent and you should see the link for download.
I am happy to introduce you August issue. This time we will be mentioning Windows, Ubuntu in our magazine, but surely it will be more than connected to BSD.
Get yourself a copy and let us know if it was usefull and interesting.
We also have modified and have another survey for you, please find some time to fill it in.
August issue of Hakin9: Securing the Cloud
New issue of Hakin9 magazine already available!
Prey: A New Hope by Mervyn Heng
An introduction to Reverse Engineering: Flash, .NET by Nilesh Kumar
Web Malware – Part 1 by Rajdeep Chakraborty
Cyber warfare with DNSbotnets by Francisco Alonso
Search Engine Security and Privacy by Rebecca Wynn
Securing the Cloud: Is it a Paradigm Shift in Information Security? by Gary Miliefsky
Radio Frequency-enabled Identity Theft by Julian Evans
Intelligence Monopolies by Matthew Jonkmann
Special Report: Capturing the New Frontier: How To Unlock the Power of Cloud Computing by Mike Armistead