Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: February 27th, 2015
Linux Security Week: February 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Encryption system for govt bosses  13 November 2000 
Source: Stuff [net-security] - Posted by Jen Olson   
Top bureaucrats will be able to swap classified material on the Net with the launch this week of a "Secure Electronic Environment" linking Treasury, the State Services Commission and the Department of Prime Minister and Cabinet.. . .
Quantum Key Distribution: The Future of Security?  10 November 2000 
Source: Windows IT Security - Posted by Dave Wreski   
The US Government is adopting a new encryption standard called Advanced Encryption Standard (AES), which will eventually replace DES. On October 2, the National Institute of Standards and Technology (NIST) announced that it had chosen Rijndael (pronounced Rhine-doll) as the new . . .
The encryption algorithm demolition derby  02 November 2000 
Source: The Register - Posted by Dave Wreski   
In the early seventies the US government put out a call for an encryption algorithm. It had no response. A year later in 1973 they tried again and got one response, from IBM. Then followed a bit of politicking, but by . . .
Bush Blasts Clinton Administration Encryption Stance  02 November 2000 
Source: NewsBytes - Posted by Benjamin D. Thomas   
Responding to a question about encryption technology in an ongoing Internet debate, Texas Gov. George W. Bush today castigated President Clinton and Vice President Gore for what he called "outdated" technology policy. "The Clinton administration has repeatedly been slow to recognize . . .
Encrypting Data in Web Forms  01 November 2000 
Source: Linux Gazette - Posted by Dave Wreski   
This month's Linux Gazette has an article on, well, encrypting data in web forms. Linux Gazette is a great online magazine, and this month is no exception. "There may be times when you want to send encrypted data . . .
U.S. crypto winners -- Belgian heroes  25 October 2000 
Source: ZDNet - Posted by Dave Wreski   
The U.S. government likes that number. Earlier this month, it selected Rijmen and Daemen's brainchild as the new Advanced Encryption Standard. That means Rijndael will soon become the shield of choice to protect sensitive U.S. government information, financial transactions and Internet . . .
VPN IPsec: Progress Slow But Steady  24 October 2000 
Source: Planet IT - Posted by Dave Wreski   
This is a pretty article that discusses why IPSec is slow going, and how now vendors are starting to work together to make sure their products interoperate when building a VPN. "As the number of VPN gateways increases, so does the . . .
Navy plans IPv6 tests  24 October 2000 
Source: Government Computer News - Posted by Dave Wreski   
The Space and Naval Warfare Systems Center in Charleston, S.C., in the coming year plans to test an IPv6 version of the Non-Classified IP Router Network. Government organizations are conducting "lots of IPv6 impact studies" in view of the rapidly declining . . .
World's Toughest Code Cracked  23 October 2000 
Source: Wired/ - Posted by Dave Wreski   
This Wired story describes the recent contest created to decipher 10 increasingly difficult codes set by author Simon Singh in his international bestseller The Code Book. Quite interesting. There's also the step-by-step analysis of what the Swedish cryptographers did in their . . .
Cache on Demand  23 October 2000 
Source: InfoSecurity Magazine - Posted by Jen Olson   
SET and a relative newcomer-IOTP-offer robust security frameworks for online transactions. So why haven't they threatened SSL's dominance as a payment protocol? When it comes to transaction security, Secure Sockets Layer (SSL) has been the de facto protocol for a . . .
<< Start < Prev 97 98 99 Next > End >>

Results 971 - 980 of 1142


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
DDoS Exploit Targets Open Source Rejetto HFS
Gemalto Confirms It Was Hacked But Insists the NSA Didnít Get Its Crypto Keys
Hackers exploit router flaws in unusual pharming attack
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.