Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: December 19th, 2014
Linux Advisory Watch: December 12th, 2014
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Network Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

DoS a Crime of the Information Age  22 February 2000 
Source: Upside Today - Posted by Team   
Upside Today writes, "You can almost hear the parchment easing out of the laser printers at Yahoo:
Wanted:Dead or Alive
Mixter, Coolio, Mafiaboy
or anyone responsible for the 2/8/00 crippling of the Yahoo network
. . .
Web attacks: Are ISPs doing enough?  22 February 2000 
Source: Robert Lemos, ZDNet -   - Posted by Team   
Robert Lemos writes..."Security experts and Internet users are becoming increasingly vocal about their concerns that high-speed Internet providers are not doing enough to ensure the data security of home users." ...but, someday we will realize that security is everyones . . .
Germany Takes Aim at Hackers  21 February 2000 
Source: Internet News - Posted by Team   
German government is coordinating a task force to try to deal with Internet security threats. "German Interior Secretary Otto Schily is setting up a Task Force to deal with the hacker threat following a spate of recent attacks on . . .
Who's Going to Train the Cyber Security Pros?  17 February 2000 
Source: Business Week Nicole St. Pierre - Posted by Team   
Nicole St. Pierre writes "Recent breaches of Web-site security are raising concern that the American workforce may not have enough troops to battle cyber snoops. Only about a half-dozen academic institutions in the U.S. have graduate programs that address computer . . .
Denial of Service (DoS) FAQ  15 February 2000 
Source: SecurityPortal - Posted by Team   
This FAQ covers denial of service attacks (DoS) in great depth, and has links to software that can be used to execute DoS attacks. Reviewing the DoS attack code can be helpful in assisting you in finding evidence of compromised . . .
FBI follows Internet chat room leads in hacker probe  15 February 2000 
Source: CNN Tech News - Posted by Team   
CNN reports, "The FBI is pursuing a number of promising leads, including Internet chat room conversations, in the probe of last week's hacker attacks on several top Web sites, according to sources familiar with the investigation." . . .
Clinton: Net attacks no 'Pearl Harbor'  15 February 2000 
Source: ZDNet - Posted by Team   
President Clinton, meeting with computer executives at the White House, said Tuesday that last week's costly Web-site hack attacks raised the alarm for tighter Internet security but were not a "Pearl Harbor." . . .
Hacking comes from the inside, computer expert warns.  15 February 2000 
Source: FairFax IT. - Posted by Team   
As written in IT Fairfax ... "Most computer hacking is carried out from within, the head of the national information security testing body said today. And Australian Information Security Evaluation Program (AISEP) manager Anne Robins said that with increasing computer . . .
New DDOS Attack Tools?  14 February 2000 
Source: - Posted by Team   
This article points to a paper on PacketStorm written by Mixter, the purported author of the TFN and TFN2K distributed denial of service attack tools. "Three new versions, called Fapi, Shaft and Trank, are disclosed in a paper . . .
CNet Interview with Mixter  14 February 2000 
Source: - Posted by Team   
Here's an interview from with Mixter, author of Tribe Flood Network and TFN2K, programs which may have been used in the recent denial of service attacks on many web sites recently. . . .
<< Start < Prev 175 176 177 Next > End >>

Results 1751 - 1760 of 1763


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Report: U.S. planning “proportional response” to Sony hack, blamed on North Korea
Heartbleed, Shellshock, Tor and more: The 13 biggest security stories of 2014
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.