Past months' Linux worms and the shell server compromise of sourceforge.net, leading to the crack of several open-source sites, have reminded us that not even Linux systems are invulnerable to ...
Computer security, Linux related or not, has always been a dynamic, ongoing process. Keeping abreast of all the security issues necessary to protect my office network (and subsequently, my livelihood) ...
The parlous state of software and IT infrastructure security is also a career opportunity, with malware analysts, security researchers, penetration testers and red teams all in demand. Defenders need ...
Hacking: The Art of Exploitation, 2nd Edition (Jon Erickson, No Starch Press, 2008) is an intense, thorough and extremely well written book that can take you from basic hacking concepts to building ...