Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Full Text of Underground Available for Download  18 January 2001 
Source: - Posted by Dave Wreski   
The full text of "Underground: tales of hacking, madness and obsession on the electronic frontier" is now available for download. ""Underground is the compelling true story of the rise of the computer underground and the crimes of an elite group of . . .
Most Secure OS Contest  18 January 2001 
Source: Net-Security - Posted by Dave Wreski   
Help Net Security has organized a contest in which participants have to write an opinion on the "most secure OS". The best five opinions will be published on the site and their authors will get a free copy of The FreeBSD . . .
LIDS FAQ v.01 Available  15 January 2001 
Source: Steve Bremer - Posted by Ryan W. Maple   
Steve Bremer has recently completed the LIDS FAQ. This is a very useful document and does an excellent job of explaining LIDS installation and configuration from the bottom-up.
CERT® Advisory CA-2001-01 Interbase Server Contains Compiled-in Back Door Account  12 January 2001 
Source: CERT/CC - Posted by Ryan W. Maple   
Interbase is an open source database package that is distributed by Borland/Inprise at and on SourceForge. The Firebird Project, an alternate Interbase package, is also distributed on SourceForge. The Interbase server for both distributions contains a compiled-in back door account . . .
Updated Secure Programming for Linux and Unix HOWTO  03 January 2001 
Source: David Wheeler - Posted by Dave Wreski   
David Wheeler has made major modifications to his HOWTO. "Version 2.70 released, adding a significant amount of additional material, such as a significant expansion of the discussion of cross-site malicious content, HTML/URI filtering, and handling temporary files.". . .
LinuxPPC Security Primer, Part I  29 December 2000 
Source: Jeff Vagle - Posted by Ryan W. Maple   
Jeff Vagle writes: "So you've bought that new G4 you've been eyeing for lo these many months. Or perhaps you've blown the dust off of some aging Performa you've kept in your basement. Either way, you've decided to install Linux on . . .
Building Linux and OpenBSD Firewalls  18 November 2000 
Source: - Posted by Benjamin D. Thomas   
Just because your paranoid does not mean they are not really after you. It is an old saying but one that applies equally well to network security, just because you have not been attacked does not mean someone is not trying. . . .
The Art of Good Computer Security Writing  07 November 2000 
Source: SecurityPortal - Posted by Benjamin D. Thomas   
Good computer security documentation teaches practical solutions clearly. Yet, too often security documents suffer from too little explanation and too technical language. Much technical documentation in general, and computer security material in particular, assumes too much on the reader's part. For . . .
Finns take aim at Oracle 'insecurity'  29 October 2000 
Source: The Register - Posted by Ryan W. Maple   
Mike Magee writes "CEO and president Hannu Turunen, who worked at Oracle until he started the software firm six years back, said: "Oracle has no secure solution at the moment. The database market is huge. There is practically no secure software . . .
Hitting the Bull's Eye  15 September 2000 
Source: InfoSecMagazine - Posted by Dave Wreski   
For those of you looking for information on creating some structure for change controls and performing security updates in your organization... "Most of the technical vulnerabilities discovered when performing a systems audit or penetration test are the result of faulty administration . . .
<< Start < Prev 40 41 42 Next > End >>

Results 411 - 420 of 444


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
FBI Quietly Removes Recommendation To Encrypt Your Phone
And the prize for LEAST SECURE BROWSER goes to ... Chrome!
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.