LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: December 19th, 2014
Linux Advisory Watch: December 12th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Host Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



New Internet browser threat sneaks by traditional defenses  17 March 2010 
Source: Network World - Posted by Anthony Pell   
An undetectable browser exploit that bares corporate networks to attackers tops the list of the most potentially effective new attacks that have been devised by researchers seeking vulnerabilities to take advantage of, according to a study by White Hat Security.
 
Scan a Windows drive for viruses using Linux  09 March 2010 
Source: gHacks - Posted by Alex   
Recently I came into a client who had a Windows XP machine that contained a nasty little virus that rendered the machine nearly unusable. When the machine would boot the CPU was pegging out at 100%, causing the GUI to be nearly unresponsive.
 
GNOME screen lock ineffective in openSUSE Linux - Update  12 February 2010 
Source: H Security - Posted by Alex   
The screen lock of openSUSE 11.2 can be bypassed by the simplest of means. A reader's report prompted The H's associates at heise Security to investigate. Tests confirmed that a locked desktop session can be unlocked without password by holding down the return key. This causes the GNOME screen saver to crash and unlock the desktop after only a few seconds.
 
Quick and easy Linux security  09 February 2010 
Source: gHacks - Posted by Anthony Pell   
You’ve just set up your Linux desktop. Naturally you want it to be as secure as possible. You’ve heard the rumors that, out of the box, Linux has outstanding security. Is it true? Do you really want to take a chance with that? Most likely not. But what can you do? There are tons of firewall tools you can use (take a look at my article “Build a custom firewall with fwbuilder” for an example). But outside of setting up a firewall on your machine, what can you do to boost the security on your desktop?
 
Scan your Linux machine for viruses with ClamTk  28 January 2010 
Source: gHacks - Posted by Alex   
What do you mean – “scan your Linux machine for viruses”? Linux is immune to viruses right? Well…mostly. Even though a proof of concept virus has been discussed, and nothing has actually made it into the wild…you still have email on your system. Some of that email could easily make its way (by way of forward for example) to another, non-Linux, machine. Because of that alone you should employ a virus scanner on ALL of your machines (Linux, Mac, Windows…)

 
OAuth and OAuth WRAP: defeating the password anti-pattern  19 January 2010 
Source: arsTechnica - Posted by Alex   
The developers behind the OAuth protocol have developed a new variant called OAuth WRAP that is simpler and easier to implement. It's a stop-gap solution that will enable broader OAuth adoption while OAuth 2.0, the next generation of the specification, is devised by a working group that is collaborating through the Internet Engineering Task Force (IETF).
 
How to Hack Password of any Operating System  05 January 2010 
Source: Hungry Hackers - Posted by Alex   
One thing any hacker should know is how to hack into login account of any operating system. Major Operating Systems that are used these days are Windows, Linux and Mac. So today I will show you how to hack into these Operating Systems. Are you curious how easy it is for someone to gain access to your computer? If so, read on to see the technique one might use to figure out your computer password.
 
Malicious PDFs: How to Protect Yourself  04 January 2010 
Source: Security Bits - Posted by Alex   
Thanks to themindgames for submitting this article. Malicious documents were the most commonly encountered exploit via the Web in 2008 and continued to be the most prominently encountered exploit in 2009. This is due to a large number of exploits for programs like Adobe Acrobat and the Microsoft Office suite, the ubiquitous use of documents via the Web and the built-in support into the browser.
 
Learn to use extended file attributes in Linux to boost security  15 December 2009 
Source: Tech Republic - Posted by Alex   
ACLs and extended attributes for files are simple and easy to use in Linux, and can go a long way in securing files. Vincent Danen goes over some of the basic file protection enhancements provided by the Linux kernel.
 
Malicious Linux screensaver proves any OS's biggest vulnerability is sitting in the chair  10 December 2009 
Source: Download Squad - Posted by Alex   
Dig up a post on just about any blog about antivirus programs for Windows, and you'll probably come across at least one comment from a Linux or Mac flexing about how impervious his or her OS is. Which is true, to a point, but your defenses are only as good as the people using them.
 
<< Start < Prev 4 5 6 Next > End >>

Results 41 - 50 of 816
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
The Difference Between Wi-Fi Security Protocols: WPA2-AES vs WPA2-TKIP
Segmenting for security: Five steps to protect your network
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.