Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: November 21st, 2014
Linux Security Week: November 17th, 2014
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Network Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Biometrics -- the end of online fraud?  06 March 2000 
Source: ZDNet - Anne Chen    - Posted by Team   
Anne Chen of ZDNet writes..."In any given James Bond movie, 007 will be subject to an iris scan, a hand print scan or voice analysis by technology that secures and verifies his identity. All the cool gadgets, fictional or not,make . . .
Hacker plan: take down the Net  01 March 2000 
Source: MSNBC - Posted by Team   
"... MSNBC has learned that several of Coolio’s associates are cooperating with federal authorities and have named the teen-ager as the culprit in the original attacks. MSNBC has also learned that the FBI executed a search warrant at Coolio’s New . . .
Gene Kim article on DDoS attacks  29 February 2000 
Source: SecurityFocus - Posted by Team   
Gene Kim talks about the recent DDoS attacks, some insight as to what the next attack is likely to be like, and what needs to be done to prevent it from occuring. . . .
Kerberos Made To Heel To Windows 2000  29 February 2000 
Source: Interactive Week [Found on linuxtoday] - Posted by Team   
"In a move that company detractors said is another sign of its infamous 'Embrace, Extend, Extinguish' strategy, Microsoft has used an open Internet security standard in its Windows 2000 operating system and made modifications without openly documenting its changes." . . .
NSA Defends Eavesdropping Policy  28 February 2000 
Source: WorldNews -   - Posted by Team   
"We want to assure you that the NSA's activities are conducted in accordance with the highest constitutional, legal and ethical standards, and in compliance with statutes and regulations designed to protect the privacy rights of U.S. persons". . . .
FBI Admits Hackers Crippled Its WebSite  26 February 2000 
Source: -   - Posted by Team   
"The FBI acknowledged today that electronic vandals shut down its own Internet site for hours last week in the same type of attack that disrupted some of the Web's major commercial sites. The bureau's Web site,, remained inaccessible for . . .
Security Experts, Universities Will Fight DoS Attacks  25 February 2000 
Source: PlanetIT - Posted by Team   
Efforts continued this week to help universities shore up security with stronger password protection and secure communications. Four vendors, led by the SANS Institute, a think tank that specializes in security, next week will announce they are teaming up to . . .
DoS a Crime of the Information Age  22 February 2000 
Source: Upside Today - Posted by Team   
Upside Today writes, "You can almost hear the parchment easing out of the laser printers at Yahoo:
Wanted:Dead or Alive
Mixter, Coolio, Mafiaboy
or anyone responsible for the 2/8/00 crippling of the Yahoo network
. . .
Web attacks: Are ISPs doing enough?  22 February 2000 
Source: Robert Lemos, ZDNet -   - Posted by Team   
Robert Lemos writes..."Security experts and Internet users are becoming increasingly vocal about their concerns that high-speed Internet providers are not doing enough to ensure the data security of home users." ...but, someday we will realize that security is everyones . . .
Germany Takes Aim at Hackers  21 February 2000 
Source: Internet News - Posted by Team   
German government is coordinating a task force to try to deal with Internet security threats. "German Interior Secretary Otto Schily is setting up a Task Force to deal with the hacker threat following a spate of recent attacks on . . .
<< Start < Prev 175 176 Next > End >>

Results 1741 - 1750 of 1760


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.