LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: November 21st, 2014
Linux Security Week: November 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Latest News
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Security vendors must eradicate 'false positives'  08 June 2010 
Source: Network World - Posted by Anthony Pell   
Symantec believes security firms should be concentrating on eradicating 'false positives' or files that are incorrectly identified as malware. The security vendor revealed it has between 10 and 40 false positives a month. However, most of these do not affect a wide number of PC users.
 
Is it possible to measure IT Security?  28 May 2010 
Source: The Register UK - Posted by Anthony Pell   
It is a commonly held principle in many areas of business that if you can’t measure something “quantitatively”, it will be difficult to raise the quality objectively. The applicability of this statement to the world of IT security is clear. Without having some form of metrics in place, it is tough, if not impossible, to judge whether security is getting better over time.
 
Newly open source BitTorrent protocol aims to unclog tubes  27 May 2010 
Source: arsTechnica - Posted by Anthony Pell   
The company behind the BitTorrent technology has opened the source code of its uTorrent Transport Protocol (uTP). A production-ready implementation of the protocol code in C++ is now available from GitHub under the MIT license.
 
When the Administrator walks...  27 May 2010 
Source: Linux Journal - Posted by Anthony Pell   
We never like to see our co-workers leave. In most cases, though, we are are happy for them because they are going on to bigger and better things. But occasionally they are not leaving under their own power. And that is when things can get...well...messy. So before you are tasked with the job of putting it all back together, why not take a moment and prepare.
 
BitTorrent Open Sources ‘Improved’ BitTorrent Protocol  26 May 2010 
Source: TorrentFreak - Posted by Alex   
BitTorrent Inc. has open sourced uTP, the BitTorrent protocol powering the latest release of uTorrent, in the hope that other BitTorrent clients will soon adopt it. UTP promises less congestion for ISPs and end users without degrading overall download speeds. Thus far, however, many BitTorrent developers outside the BitTorrent Inc. team are skeptical about the new protocol.
 
Google's encrypted search casts shadow on web analytics  25 May 2010 
Source: The Register UK - Posted by Alex   
In adding SSL encryption to its primary search engine, Google isn't just protecting your traffic from anyone sniffing your network. It's also preventing third-party webmasters from tracking the search terms you used to find their sites. That may be a good thing for netizens intent on privacy lockdown. But for webmasters, it could be a bit of a problem.
 
Code Security: MidAmerican Energy's top priority after SQL injection attacks  24 May 2010 
Source: CSO Online - Posted by Alex   
Security practitioners are increasingly bent on better code security, as Microsoft SDL, BSIMM and Rugged demonstrate. Here's how it became Priority 1 for one of the nation's largest energy providers.
 
Our growing security quagmire  21 May 2010 
Source: Network World - Posted by Alex   
Information security was always an esoteric field but with personal computing came personal security issues, culminating in the identity theft problem that concerns even the most techno-phobic of consumers. It's about to get much worse.
 
Review of Masters of Deception Posted  17 May 2010 
Source: taoSecurity - Posted by Anthony Pell   
Amazon.com just posted my three star review of Masters of Deception by Michelle Slatella and Joshua Quittner. From the review: Masters of Deception (MOD) by Michelle Slatella and Joshua Quittner tells the tale of the self-proclaimed Masters of Deception, a phone phreaking and proto-computer hacker crew from the early 1990s.
 
Month of PHP Security  12 May 2010 
Source: H Security - Posted by Alex   
Information about more than 20 vulnerabilities has been disclosed as part of the "Month of PHP Security" (MOPS) held this May. Eight of the holes are contained in PHP applications, while 12 affect PHP itself. Four articles about PHP security have also been published.
 
<< Start < Prev 70 71 72 Next > End >>

Results 691 - 700 of 822
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Google Removes SSLv3 Fallback Support From Chrome
Hacker Lexicon: What Is End-to-End Encryption?
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.