Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 23rd, 2015
Linux Advisory Watch: March 20th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Record company prepares to sell copy-protected CDs  11 December 2000 
Source: - Posted by Dave Wreski   
Country music record company Fahrenheit Entertainment said it will begin selling copy-protected CDs by early next year using encryption technology from SunnComm, a little-known company based in Phoenix. If successfully employed, SunnComm's technology could become the first to hamper the copying . . .
Encryption experts set to bust RIP rules  07 December 2000 
Source: Computer Weekly - Posted by Benjamin D. Thomas   
The Regulation of Investigatory Powers (RIP) Act could be so much waste paper if a groundbreaking UK encryption project succeeds. Mathematician Peter Fairbrother has launched a project called M-o-o-t, which would make it physically impossible to surrender encryption keys - . . .
Mightier Than the Pen  06 December 2000 
Source: ZDNet - Posted by Jen Olson   
Digital signatures are coming, promising the rebirth of the Internet gold rush and the death of paper. Either that or a security nightmare. Earlier this year, President Clinton took the first step toward ending Hancock's long association with autographs by signing . . .
My security algorithm is faster than yours  03 December 2000 
Source: The Register - Posted by Dave Wreski   
IBM claims to have invented a new encryption algorithm which can encrypt and authenticate data in one step. The algorithm takes advantage of parallel processing hardware, to cut in half the time taken to encrypt data. However, the news has failed . . .
Secure Communication with GnuPG on Linux  03 December 2000 
Source: Linux Gazette - Posted by Dave Wreski   
GnuPG is a tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. GnuPG is a complete and free replacement for PGP. Because it does not use the patented IDEA algorithm, it . . .
IBM claims faster encryption technology  02 December 2000 
Source: ZDNet - Posted by Dave Wreski   
IBM Corp. announced Thursday a secure method for digitally scrambling and signing data that it claims will take half the time of today's fastest techniques. IBM billed the combination encryption-authentication technique as especially suitable to secure mobile communications because of . . .
Agency adds smart cards, PKI  30 November 2000 
Source: FCW - Posted by Benjamin D. Thomas   
The Bureau of Labor Statistics is bolstering systems security by adding public-key infrastructure and providing smart cards to 1,500 employees. BLS will issue most of the cards to field workers who sign in to the agency's network remotely. Currently, remote . . .
Cryptography, PGP and Pine  25 November 2000 
Source: Linux Gazette - Posted by Benjamin D. Thomas   
Encryption is the transformation of data into a form that is (hopefully) impossible to read without the knowledge of a key. Its purpose is to ensure privacy by keeping information hidden from anyone for whom it is not intended. Decryption . . .
Encryption, Free Speech and Government Regulation  22 November 2000 
Source: - Posted by Benjamin D. Thomas   
Encryption software has sparked regulation by the U.S. government and at least two important lawsuits involving the First Amendment. Exporting encryption products requires a thorough understanding of what's legal and what's not. This article explains the issues. . . .
Will the Future Be Anonymous?  17 November 2000 
Source: SecurityPortal - Posted by Jen Olson   
The work of David Chaum and Stefan Brands on protocols, such as blind signatures, that provide anonymity has attracted a great deal of interest among people interested in cryptography. In the RSA algorithm, given a public key consisting of an encryption . . .
<< Start < Prev 97 98 99 Next > End >>

Results 961 - 970 of 1147


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Tech Companies, Privacy Advocates Call for NSA Reform
Google warns of unauthorized TLS certificates trusted by almost all OSes
How Kevin Mitnick hacked the audience at CeBIT 2015
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.