Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Network Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Allegro-Software-RomPager 2.10 vulnerable to Dos Attack  02 June 2000 
Source: Bugtraq - Posted by Team   
Here is a pretty serious DoS advisory released on Bugtraq. I am not aware of any fixes, yet. We'll keep you posted! "Allegro-Software-RomPager is an http server which is used in network hardware like switches to provide a . . .
TACACS+ Analysis  01 June 2000 
Source: OpenWall Project - Posted by Team   
TACACS+ is a protocol used to provide access control for routers and network devices created by Cisco. Solar found a buffer overflow and reported it and supplied a patch in the report below. Cisco later responded to . . .
Nmap 2.53 Released  31 May 2000 
Source: - Posted by Team   
The latest version of nmap, a utility for port scanning networks, has been released. This tool should be in everyone's security arsenal. "The main addition is IP Protocol scan mode (-sO) which tells you what protocols the host . . .
The Shell Game  31 May 2000 
Source: DevShed [Thanks to Randy Cosby] - Posted by Team   
This article explains the need and rationale for Secure SHell, an encrypted communications channel which functions as a telnet replacement, and also guides you through the process of installing and using SSH on your own system. . . .
Access denied: Government taking information off the web  31 May 2000 
Source: Federal Computer Week --    - Posted by Team   
When it emerged less than a decade ago, the World Wide Web was quickly embraced as a bright new medium that could help reinvent government and revitalize democracy. But gradually government policy-makers have also seen that the Web has a . . .
Spring cleaning tips for managers  30 May 2000 
Source: GCN --   - Posted by Team   
If your agency deals in classified or sensitive information, you probably wage an ongoing war against Internet hackers. The danger isn’t so much from hackers’ creativity as much as it’s due to managers’ failures to seal security holes, establish policies . . .
popa3d v0.4 contributed Kerberos v4 and APOP authentication patches  30 May 2000 
Source: OpenWall Project [Thanks to Solar Designer] - Posted by Team   
Dug Song has contributed Kerberos v4 (KPOP) and APOP authentication patches for popa3d v0.4. I've mirrored them into popa3d/contrib on the FTP and added links to the popa3d page at the usual location: . . .
IPv6 wins support as third-generation multimedia protocol  29 May 2000 
Source: InfoWorld - Posted by Team   
"... The proposal, which paves the way to make IPv6 the standard protocol in third-generation mobile multimedia networks, was accepted this week in a plenary session of the system architecture group of the 3GPP (Third-Generation Partnership Project), Nokia said in . . .
Can IPv6 replace SSL?  29 May 2000 
Source: - Posted by Team   
Reto Haeni has written this paper that gives a brief overview of the features of IPv6 and discuss its security specifications. In the later sections of the paper, he compares the security specifications of IPv6 to one of today's available . . .
Secure Web-2-WAP File Transfers now Possible  26 May 2000 
Source: --   - Posted by Team   
Accessing the Web using WAP (Wireless Application Protocol)-enabled mobile phones may be all the rage, but what about the security issues? While it is possible to encrypt selected sections of the Web using a desktop PC with conventional browser and . . .
<< Start < Prev 169 170 171 Next > End >>

Results 1681 - 1690 of 1767


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
FBI Quietly Removes Recommendation To Encrypt Your Phone
And the prize for LEAST SECURE BROWSER goes to ... Chrome!
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.