The world is concerned with cyber espionage in the perpetual firestorm of information gathering, and the prime target? Linux servers. Learn why in this report as well as different types of remote access trojans (RATs) and what they look like.
This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.
When it comes to IT, Linux is everywhere. From smart phones to powerful computer systems, this flexible operating system addresses a significant number of usage models. Read this white paper to learn more about the universal platform and discover all the computer segments that it plays a role in.
Gain new control over your mixed environment and get a preview of the new solutions making history. Microsoft and Novell are coming together to help you operate better and achieve your key technical and business goals.
Posted: 14 Dec 2006 | Premiered: Dec 19, 2006, 10:30 EST (15:30 GMT)
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.