Applications

The Trouble with Tor

For over a decade, people all over the world have used Tor (formerly known as the Onion Router) to protect their privacy. The U.S. Naval Research Laboratory developed the system using open source te...

VeraCrypt a Worthy TrueCrypt Alternative

When the TrueCrypt encryption software project was abandoned two years ago, it left many folks looking for an open source encryption system. VeraCrypt appeared on the scene as a TrueCrypt alternat...

5 Common WordPress Security Vulnerabilities and How to Fix Them

Did you know that more than 73 million web sites in the world run on the WordPress publishing platform? This makes WordPress more popular than Microsoft SharePoint, Blogger, or Drupal. It also mea...

The Top 75 Open Source Security Apps

  About a year ago, we took a look at the growing trend toward open-source securityand highlighted 10 of the best apps available. Since then, the area has conti...

Latest articles