LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: September 26th, 2014
Linux Security Week: September 22nd, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Documentation
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Draft Special Publication 800-100: Information Security Handbook: A Guide for Managers  16 June 2006 
Source: NIST - Posted by Eric Lubow   
This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to establish and implement an information security program. The purpose of this publication is to inform members of the information security management team [agency heads, chief information officers (CIO), senior agency information security officers (SAISO), and security managers] about various aspects of information security that they will be expected to implement and oversee in their respective organizations. This handbook summarizes and augments a number of existing National Institute of Standards and Technology (NIST) standard and guidance documents and provides additional information on related topics. NIST requests public comments on the draft until August 07, 2006; comments may be sent to handbk-100@nist.gov .
 
Information Security Handbook: A Guide for Managers  15 June 2006 
Source: NIST - Posted by Benjamin D. Thomas   
This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to establish and implement an information security program.

The purpose of this publication is to inform members of the information security management team [agency heads, chief information officers (CIO), senior agency information security officers (SAISO), and security managers] about various aspects of information security that they will be expected to implement and oversee in their respective organizations. This handbook summarizes and augments a number of existing National Institute of Standards and Technology (NIST) standard and guidance documents and provides additional information on related topics.

 
How To Set Up suPHP With PHP4 And PHP5  12 June 2006 
Source: HowToForge - Posted by Eric Lubow   
This tutorial shows how to install and use suPHP with PHP4 and PHP5. suPHP is a tool for executing PHP scripts with the permissions of their owners instead of the Apache user. With the help of suPHP you can also have PHP4 and PHP5 installed at the same time which I will describe at the end of this article. suPHP integrates into Apache2 as a module. At the time of this writing it does work with Apache2 prior to version 2.2. Version 2.2 is not supported yet.

 
A Comparison of SNMP v1, v2 and v3  05 June 2006 
Source: InfoSec Writers - Posted by Eric Lubow   
During its development history, the communities of researchers, developers, implementers and users of the DARPA/DoD TCP/IP protocol suite have experimented with a wide range of protocols in a variety of different networking environments. The Internet has grown, especially in the last few years, as a result of the widespread availability of software and hardware supporting this system. The scaling of the size and scope of the Internet and increased use of its technology in commercial applications has underscored for researchers, developers and vendors the need for a common network management framework within which TCP/IP products can be made to work.

 
How To Automate Spamcop Submissions  29 May 2006 
Source: Howto Forge - Posted by Efren J. Belizario   
Spamcop is a service which provides RBLs for mailservers in order to reject incoming mail from spammers. Their philosophy is to process possible spam complaints from users. When they receive a certain amount of complaints during a time-period then they will blacklist the offender. This system is dependant on spam reporting from users. However, their submission process is not very user-friendly.

 
Z4CK - Digital Force, Zaurus Centric hacker novel  26 May 2006 
Source: z4ck.org - Posted by Benjamin D. Thomas   
In late 2004 Z4CK - meaning Zaurus-ACK, a novel about a hacker who creates the ultimate hacking tool was released in PDF and paperback formats. The novel was well received by the Linux, PDA and Security communities. In Z4CK Duncan Steele creates the ultimate hacking tool, which goverment agencies and criminals alike are desperate to obtain, so much so that the main character finds himself framed by the government for a murder he did not commit. Unlike films such as 'The Net' and 'Swordfish' real world hacking techniques are used.

 
Putting MediaWiki to Use in an Organization  21 May 2006 
Source: www.newsforge.com - Posted by Paul VonBurg   
Imagine how useful it would be to have an online knowledge base that can easily be updated created by key people within your organization. That's the promise of a wiki -- a Web application that "allows users to easily add, remove, or otherwise edit all content, very quickly and easily," as Wikipedia, perhaps the best-known wiki, puts it. Why not bring the benefits of a wiki to your organization? If you're sold on the concept, the first thing you need to do is to pick the software that you're going to use for your wiki. If you want hunt around to find out what's out there, a good place to start is Wikipedia's wiki software wiki. If you say, "I'll use whatever Wikipedia is using," that'll be MediaWiki.

 
Computer Security: Your 5-Step Survival Guide  17 May 2006 
Source: www.baselinemag.com - Posted by Paul VonBurg   
It's a dangerous world. Every day, thousands of attacks that threaten to corrupt key systems, steal customer data, and otherwise abuse information-technology assets assault U.S. businesses. The SANS Institute, which provides computer security education and training, estimates that the average Internet network address experiences an attack every 24 minutes. In most cases, it's an unscrupulous hacker trying to infect corporate computers with viruses, worms and Trojans-commonly dubbed "malware."

 
A FOSS Primer for International Policy-makers  12 May 2006 
Source: www.newsforge.com - Posted by Paul VonBurg   
When investigating free and open source software (FOSS) development and implementation in developing countries, you're likely to run into Ken Wong and Phet Sayo's FOSS primer, published by the International Open Source Network. What makes this primer so special, and so widely known? To find out, we interviewed the authors.

NewsForge: There are a number of FOSS primers available on the Internet. What motivated you to write yours, and what makes it different from the others?

 
How To Scan Your Linux-Distro for Root Kits  10 May 2006 
Source: How To Forge - Posted by Eric Lubow   
So... What in the hell is a root kit ??? A root kit is a collection of programs that intruders often install after they have compromised the root account of a system. These programs will help the intruders clean up their tracks, as well as provide access back into the system. Root kits will sometimes leave processes running so that the intruder can come back easily and without the system administrator's knowledge!

 
<< Start < Prev 4 5 6 Next > End >>

Results 41 - 50 of 444
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Shellshock makes Heartbleed look insignificant
Hacker Group Lizard Squad Takes Down Destiny, Call of Duty, FIFA And More
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.