Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Host Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Security Software Market to Top $7 Billion in 2002  07 March 2000 
Source: Netscape/Standard - Posted by Team   
The market for Internet security software is expected to reach $4.2 billion worldwide in 1999, and to grow to $7.4 billion in 2002, according to IDC, which based the study on a survey of 300 companies with more than $100 . . .
Intel tackles notebook security  06 March 2000 
Source: ZDNet - Posted by Team   
Intel Corp. plans to announce this week a new security architecture designed to make stolen notebooks 'as useful as bricks.' The new preboot security method, which is based on IPAA ( Intel Protected Access Architecture), will integrate additional software and . . .
SalesGate, Intuit Pilfered  05 March 2000 
Posted by Team   
"The hacker who broke into online shopping mall's site last week and reportedly stole thousands of customer credit card numbers is the latest in a string of intruders that have plagued the Internet this year. News wires also reported . . .
Learning the basics of buffer overflows  04 March 2000 
Source: IBM Developerworks - Posted by Team   
"Buffer overflows accounted for over 50 percent of all major security bugs leading to CERT/CC advisories last year. ... So why are buffer overflow vulnerabilities still being produced? Because the recipe for disaster is surprisingly simple. Take one part bad . . .
Tripwire releases source code  01 March 2000 
Source: Newsalert - Posted by Team   
Great news. The once open source software turned commercial program Tripwire will be open source again in Q3. The potential implications for the existing open source projects may have to be re-evaluated. "Tripwire, Inc., the leading provider . . .
PIKT, Problem Informant/Killer Tool, v1.9.0 released  29 February 2000 
Source: PIKT Website [Found on linuxtoday] - Posted by Team   
"PIKT, an innovative new paradigm for administering heterogeneous networked workstations, is a multi-functional tool for monitoring systems, reporting and fixing problems, and managing system configurations. PIKT is quickly gathering potential as a serious security management system. PIKT comprises an embedded . . .
New hacker software could spread by email  23 February 2000 
Source: By John Borland - Posted by Team   
A group of anonymous programmers has released a new version of the software that shut down Yahoo and earlier this month--one that makes it far easier to launch attacks, computer experts say. . . .
Pentagon Security Cracked During Testing  23 February 2000 
Source: - Daniel Verton   - Posted by Team   
Daniel Verton writes..." Information warfare tests conducted in September 1999 on the Pentagon's $1.6 billion Defense Message System found serious deficiencies in the system's security protections. During operational tests of DMS software Version 2.1, conducted last year by the Defense . . .
Consumers grow increasing vocal about broadband security  22 February 2000 
Source: ZDNet - Posted by Team   
Security experts and Internet users are becoming increasing vocal their concerns that Internet providers may not be doing enough to protect user's privacy. Linux users can implement many free solutions to protect themselves. . . .
California voters may get anti-spam ballot  22 February 2000 
Source: ZDNet - Posted by Team   
This ZDNet article writes, "California consumer groups are trying to ban most unsolicited commercial e-mails - also known as spam - using the Web and the ballot box as their weapons. But the effort faces hurdles, both financial and constitutional. . . .
<< Start < Prev 79 80 81 Next > End >>

Results 791 - 800 of 816


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
FBI Quietly Removes Recommendation To Encrypt Your Phone
And the prize for LEAST SECURE BROWSER goes to ... Chrome!
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.