Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: January 23rd, 2015
Linux Advisory Watch: January 16th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

World's Toughest Code Cracked  23 October 2000 
Source: Wired/ - Posted by Dave Wreski   
This Wired story describes the recent contest created to decipher 10 increasingly difficult codes set by author Simon Singh in his international bestseller The Code Book. Quite interesting. There's also the step-by-step analysis of what the Swedish cryptographers did in their . . .
Cache on Demand  23 October 2000 
Source: InfoSecurity Magazine - Posted by Jen Olson   
SET and a relative newcomer-IOTP-offer robust security frameworks for online transactions. So why haven't they threatened SSL's dominance as a payment protocol? When it comes to transaction security, Secure Sockets Layer (SSL) has been the de facto protocol for a . . .
New Encryption Regulations Take Effect On Today  20 October 2000 
Source: NewsBytes - Posted by Dave Wreski   
In the final step toward matching the European Union's recent liberalization of rules governing the export of encryption products, the Commerce Department's Bureau of Export Administration has published a final rule allowing the export of encryption products of any strength to . . .
Crypto-Gram October 15  16 October 2000 
Source: Counterpane - Posted by Dave Wreski   
This month Bruce Schneier talks about the AES announcement, the NSA and security, "The Third Wave of Network Attacks", and comments on Senator Orrin Hatch's "Privacy Tools Handbook".
Crypto Expert Warns That Cryptography Not Secure Enough  13 October 2000 
Source: NewsBytes - Posted by Benjamin D. Thomas   
One of the world's leading experts on computer security said that because of recent developments in the online world, cryptography on its own is now not enough to protect systems in the digital world. In his new book, Bruce Schneier, an . . .
Cracked! 'World's toughest' code broken  12 October 2000 
Source: ZDNet - Posted by Dave Wreski   
A team of Swedish computer buffs has fought off thousands of rivals from around the world to crack what was billed as the toughest code challenge ever set. It took the Swedes the equivalent of 70 years of computer time to . . .
LCI-SMARTpen AES Compliance  12 October 2000 
Posted by Ryan W. Maple   
The new model of LCI-SMARTpen is the first in the world to comply with new encryption standard. "The National Institute for Standards and Technology (NIST) has selected Rijndael as the proposed Advanced Encryption Standard (AES) algorithm. The AES will be . . .
International Kernel Patch  11 October 2000 
Source: Freshmeat - Posted by Benjamin D. Thomas   
The idea of the International Kernel Patch is to collect all crypto patches so that using crypto in the kernel will be easier than today. The patch includes a number of crypto patches including a crypto API including Blowfish, CAST-128, DES, . . .
Enigma machine deadline passes  10 October 2000 
Source: BBC News - Posted by Ryan W. Maple   
As most may know, one of three existing Enigma machines was stolen a few months ago. Bletchley Park Museum had agreed to hand over a £25,000 ransom before midnight on Friday but the deadline passed with no word from the . . .
Cryptography, PGP and Pine  05 October 2000 
Source: LinuxGazette [LWN] - Posted by Dave Wreski   
This article starts out with a nice description of cryptography then goes into how to incorporate PGP for use with Pine. "Encryption is the transformation of data into a form that is (hopefully) impossible to read without the knowledge of a . . .
<< Start < Prev 97 98 99 Next > End >>

Results 971 - 980 of 1134


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Barrett Brown Sentenced to 5 Years in Prison in Connection to Stratfor Hack
Thousands of U.S. gas stations exposed to Internet attacks
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.