LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 7th, 2014
Linux Advisory Watch: April 4th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Intrusion Detection
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



DDoS attackers raising the bar  18 June 2001 
Source: ZDNet eWeek - Posted by Jen Olson   
Distributed denial-of-service attacks-which by some estimates total more than 4,000 a week-are likely to get much worse as the perpetrators hone their skills and new weaknesses in popular platforms are discovered and exploited. As vendors such as Asta Networks Inc. and . . .
 
New Tool Will Expose Security-Slacker ISPs  17 June 2001 
Source: NewsBytes - Posted by Pete O'Hara   
The problem of denial of service attacks could be solved overnight if Internet service providers cleaned up their act, a security gadfly said Tuesday. Steve Gibson, president of Gibson Research Corp., is developing a free tool that will hold ISP's feet to the fire if they have not implemented a security technique known as "egress filtering." . . .
 
Net Security Conference: Denial Of Service Wars Heat Up  08 June 2001 
Source: Newsbytes - Posted by Nick DeClario   
The arms race between hackers and security personnel continues unabated as each side constantly strives to top the capabilities of the other - especially when it comes to denial of service (DoS) attacks. That is the message from the "anti-hacking" symposium . . .
 
Expert: Windows XP could unleash wave of DoS attacks  06 June 2001 
Source: InfoWorld - Posted by Jen Olson   
The implementation of Unix Sockets is troubling, Gibson wrote, because they are frequently used in two aspects of DoS attacks: falsifying IP addresses -- a technique called spoofing that makes the source of an attack harder to pinpoint, and allowing computers . . .
 
The Trouble With Tripwire: Making a Valuable Security Tool More Efficient  06 June 2001 
Source: SecurityFocus - Posted by Derrick Lewis   
If an attack against a system is detected, how can it be determined that a system has actually been compromised and important files removed or altered? One answer is to always run Tripwire. Unfortunately, due to the volume and frequency of . . .
 
Forensic Analysis of the GRC DDoS Attack  05 June 2001 
Source: GRC.com - Posted by Dave Wreski   
Steve Gibson recounts the steps he took to stop his attack from being subjected to a distributed denial of service attack. "I believe you will be as fascinated and concerned as I am by the findings of my post-attack forensic analysis, and the results of my subsequent infiltration into the networks and technologies being used by some of the Internet's most active hackers.". . .
 
Hacking Into Wall Street  30 May 2001 
Source: TechTV - Posted by Derrick Lewis   
A Wall Street brokerage finds out that trusting its own employees isn't always a safe bet. On March 10, 2000, the Nasdaq reached an all-time high, breaking the 5000 mark for the very first time. Internet Trading Technologies (ITTI) wasn't participating . . .
 
DoS attack disables Net security watchdog  23 May 2001 
Source: ZDNet - Posted by Pete O'Hara   
Unknown attackers inundated the Computer Emergency Response Team Coordination Center with data Tuesday and Wednesday, cutting off the public's access to the organization largely responsible for warning others on the Internet about computer-security threats. The attack began around 9 a.m. PDT . . .
 
UC San Diego Researchers Analyze Prevalence, Patterns of Worldwide Denial-of-Service Attacks on Inte  22 May 2001 
Source: Symantec - Posted by Ryan W. Maple   
Using a new technique, University of California, San Diego network researchers from the San Diego Supercomputer Center [SDSC] and the Jacobs School of Engineering have analyzed the worldwide pattern of malicious denial-of-service [DoS] attacks against the computers of . . .
 
Intrusion-Detection Systems by the Numbers  21 May 2001 
Source: ComputerWorld - Posted by Dave Wreski   
My company recently tested and acquired a network-based intrusion-detection system (IDS). Over the past few months, I've received many e-mails from readers asking me to explain the performance-testing methodology I used, so I've decided to share how I tested our network-based IDS.. . .
 
<< Start < Prev 73 74 75 Next > End >>

Results 721 - 730 of 798
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Heartbleed: Security experts reality-check the 3 most hysterical fears
Open source trounces proprietary software for code defects, Coverity analysis finds
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.