LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: November 21st, 2014
Linux Security Week: November 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Intrusion Detection
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Eliminating IDS Babble  28 June 2001 
Source: InfoSec Magazine - Posted by Jen Olson   
Simply put, there are as many different IDS applications as there are attack vectors (figuratively speaking, of course). As many organizations have discovered, multiple IDS solutions are needed to monitor different platforms and networks. This diversity inhibits enterprise-wide pooling and correlation . . .
 
Socket man: Steve Gibson's DDoS attacks  20 June 2001 
Source: Newsforge - Posted by Dave Wreski   
I dig Steve Gibson. Not only is this renegade computer security consultant a great storyteller, but he's one of the best Net advocates out there, a regular Abbie Hoffman of the binary age. Still, his latest crusade has me wondering if he isn't starting to value Microsoft-bashing over basic honesty.. . .
 
Security pros dig in for new DoS attacks  19 June 2001 
Source: ZDNet UK - Posted by Dave Wreski   
Despite new tools to fight off invaders, DoS attacks are only going to get worse - thanks to tools freely available on the Internet. Distributed denial-of-service attack -- which by some estimates total more than 4,000 a week -- are likely to get much worse as the perpetrators hone their skills and new weaknesses in popular platforms are discovered and exploited.. . .
 
DDoS attackers raising the bar  18 June 2001 
Source: ZDNet eWeek - Posted by Jen Olson   
Distributed denial-of-service attacks-which by some estimates total more than 4,000 a week-are likely to get much worse as the perpetrators hone their skills and new weaknesses in popular platforms are discovered and exploited. As vendors such as Asta Networks Inc. and . . .
 
New Tool Will Expose Security-Slacker ISPs  17 June 2001 
Source: NewsBytes - Posted by Pete O'Hara   
The problem of denial of service attacks could be solved overnight if Internet service providers cleaned up their act, a security gadfly said Tuesday. Steve Gibson, president of Gibson Research Corp., is developing a free tool that will hold ISP's feet to the fire if they have not implemented a security technique known as "egress filtering." . . .
 
Net Security Conference: Denial Of Service Wars Heat Up  08 June 2001 
Source: Newsbytes - Posted by Nick DeClario   
The arms race between hackers and security personnel continues unabated as each side constantly strives to top the capabilities of the other - especially when it comes to denial of service (DoS) attacks. That is the message from the "anti-hacking" symposium . . .
 
Expert: Windows XP could unleash wave of DoS attacks  06 June 2001 
Source: InfoWorld - Posted by Jen Olson   
The implementation of Unix Sockets is troubling, Gibson wrote, because they are frequently used in two aspects of DoS attacks: falsifying IP addresses -- a technique called spoofing that makes the source of an attack harder to pinpoint, and allowing computers . . .
 
The Trouble With Tripwire: Making a Valuable Security Tool More Efficient  06 June 2001 
Source: SecurityFocus - Posted by Derrick Lewis   
If an attack against a system is detected, how can it be determined that a system has actually been compromised and important files removed or altered? One answer is to always run Tripwire. Unfortunately, due to the volume and frequency of . . .
 
Forensic Analysis of the GRC DDoS Attack  05 June 2001 
Source: GRC.com - Posted by Dave Wreski   
Steve Gibson recounts the steps he took to stop his attack from being subjected to a distributed denial of service attack. "I believe you will be as fascinated and concerned as I am by the findings of my post-attack forensic analysis, and the results of my subsequent infiltration into the networks and technologies being used by some of the Internet's most active hackers.". . .
 
Hacking Into Wall Street  30 May 2001 
Source: TechTV - Posted by Derrick Lewis   
A Wall Street brokerage finds out that trusting its own employees isn't always a safe bet. On March 10, 2000, the Nasdaq reached an all-time high, breaking the 5000 mark for the very first time. Internet Trading Technologies (ITTI) wasn't participating . . .
 
<< Start < Prev 76 77 78 Next > End >>

Results 751 - 760 of 831
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Google Removes SSLv3 Fallback Support From Chrome
Hacker Lexicon: What Is End-to-End Encryption?
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.