LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: September 19th, 2014
Linux Security Week: September 15th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Latest News
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



2005 Semi-Annual Web Security Trends Report  03 October 2005 
Posted by LogError   
Websense released the 2005 Semi-Annual Web Security Trends Report issued by Websense Security Labs. The new report summarizes findings for the first half of 2005 and presents projections for the upcoming year.
 
(IN)SECURE Magazine Issue 3  16 August 2005 
Source: LogError - Posted by Benjamin D. Thomas   
The third issue of (IN)SECURE, a free digital security magazine published in PDF format, has been released: http://www.insecuremag.com

 
ActiveState Releases ActivePerl, ActivePython & ActiveTcl for Sun's Solaris 10  28 June 2005 
Source: Kerry - Posted by Benjamin D. Thomas   
ActiveState, a leading provider of developer tools and services for dynamic languages, today announced the release of ActiveState's ActivePerl, ActivePython, and ActiveTcl language distributions for Sun's Solaris 10 Operating System (OS) for SPARC, x86 and x64 systems. The release underlines ActiveState's commitment to providing developers with up-to-date scripting languages on Sun Solaris 10.

 
(IN)SECURE Digital Security Magazine issue 2 is out  17 June 2005 
Posted by LogError   
The second issue of (IN)SECURE, a free digital security magazine published in PDF format, has been released:

http://www.insecuremag.com

 
Talking with Richard Stallman  12 June 2005 
Source: TuxJournal.net - Posted by Vincenzo Ciaglia   
1) Let's start. Can you explain to our readers why you started with FSF in 1984? What did you need of? Why you created it?
What I started in 1984 was the development of the GNU operating system. All the operating systems for modern computers of the day were proprietary; users were forbidden to share them, and could not get the source code to change them. The only way to use computers in freedom was to replace those systems with a free operating system. That's what GNU was meant to do. The Free Software Foundation was started in late 1985 to raise funds for GNU development, and more generally to promote free software.
Read more at TuxJournal.net
 
Interview with the guru of Python  26 May 2005 
Source: tuxjournal.net - Posted by Vincenzo Ciaglia   
An italian web magazine interviewed Guido Van Rossum, the guru of Python. An interesting interview has been created Read Here!
 
Interview with Richard Stallman  25 April 2005 
Source: tuxjournal.net - Posted by Vincenzo Ciaglia   
An Italian web magazine, TuxJournal.net, has published an interesting interview with Richard Stallman. The interview deal of GPL news, Free Bios, Software Patents and much more. It could be interesting for each GNU/Linux user.
 
Fighters Against Child Porn Face Spyware Battle, Too  14 March 2005 
Source: securitypipeline.com - Posted by Vincenzo Ciaglia   
very person or organization that spends time surfing the Web faces the risk of spyware and viruses. For those who spend time investigating sites that specialize in child pornography and other illicit material, the risk is even greater. That's why software to protect their machines is crucial. The National Center for Missing and Exploited Children on Wednesday began migrating its systems to Active Directory. That deployment had been on hold because of the large quantities of spyware, pop-ups, and other malicious software the center's workers ran into as they investigated potentially illicit Web sites, according to Steve Gelfound, director of IT at the center.


 
What's The Best VoIP System For SMBs?  15 February 2005 
Source: networkingpipeline.com - Posted by Vincenzo Ciaglia   
Making phone calls using a broadband Internet connection, more fondly known as VoIP (Voice over Internet Protocol), is becoming more and more popular with corporations of every size. The prospect of paying a flat fee for unlimited long-distance phone calls is appealing to every company that has struggled to balance the need to conduct business phone calls with the price of those calls. Calling plans are now available that provide unlimited minutes to any U.S. or Canadian phone number by routing the voice traffic over an existing broadband connection shared with the company's Internet access.


 
Internet Mobilizes To Aid Tsunami Victims  04 January 2005 
Source: securitypipeline.com - Posted by Vincenzo Ciaglia   
From bloggers to multi-billion-dollar tech vendors, the Internet community gave its money and resources to help victims of the Asian tsunamis. Here's a roundup of our stories on the subject, including moving reports from a blogger who described the toll via cell-phone text messaging, and other bloggers who wrote what they saw from the scene of the carnage.

 
<< Start < Prev 79 80 81 Next > End >>

Results 791 - 800 of 802
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Google to turn on encryption by default in next Android version
TOR users become FBI's No.1 hacking target after legal power grab
OWASP Releases Latest App Sec Guide
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.