Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: February 27th, 2015
Linux Security Week: February 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Intrusion Detection
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Snort Version 1.8 Release  10 July 2001 
Source: - Posted by Ryan W. Maple   
Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks . . .
Getting started in computer forensics  10 July 2001 
Source: Computer World - Posted by Dave Wreski   
Many private companies are turning to the military and law enforcement agencies to find computer forensics and security professionals. Some officers are leaving their posts for jobs in the corporate world, sometimes doubling or even tripling their salaries. That's what Jose . . .
Intrusion Detection Systems Terminology, Part One: A - H  05 July 2001 
Source: Security Focus - Posted by Benjamin D. Thomas   
Intrusion Detection Systems (IDS) are still very much in their infancy, but in terms of development they are growing at an extraordinary rate. The terminology associated with IDS is also growing at rapidly. This article is intended to introduce readers to . . .
How to stop a service denial attack before it stops you  04 July 2001 
Source: GCN - Posted by Dave Wreski   
It's not easy to defend a federal Web server against distributed service denial attacks, but it?s not impossible either. For years now, the government has been under the gun in an undeclared cyberwar with hackers around the globe. The simplest and . . .
Stemming the DoS flood  02 July 2001 
Source: ZDNet - Posted by Pete O'Hara   
One the most aggravating Internet security threats today is a distributed denial-of-service attack--a flood of bogus network traffic that can effectively shut down a Web site. Far from going away, the phenomenon is evolving in different permutations. But new tools are . . .
Introduction to Network-Based Intrusion Detection Systems Using Snort  28 June 2001 
Source: UnixReview - Posted by Dave Wreski   
This article will provide a basic overview of today's ID systems. It doesn't aim to be complete but gives a good starting point for further information. I will talk about different architecture approaches for ID systems, host and network based, to improve overall security for your business.. . .
Eliminating IDS Babble  28 June 2001 
Source: InfoSec Magazine - Posted by Jen Olson   
Simply put, there are as many different IDS applications as there are attack vectors (figuratively speaking, of course). As many organizations have discovered, multiple IDS solutions are needed to monitor different platforms and networks. This diversity inhibits enterprise-wide pooling and correlation . . .
Socket man: Steve Gibson's DDoS attacks  20 June 2001 
Source: Newsforge - Posted by Dave Wreski   
I dig Steve Gibson. Not only is this renegade computer security consultant a great storyteller, but he's one of the best Net advocates out there, a regular Abbie Hoffman of the binary age. Still, his latest crusade has me wondering if he isn't starting to value Microsoft-bashing over basic honesty.. . .
Security pros dig in for new DoS attacks  19 June 2001 
Source: ZDNet UK - Posted by Dave Wreski   
Despite new tools to fight off invaders, DoS attacks are only going to get worse - thanks to tools freely available on the Internet. Distributed denial-of-service attack -- which by some estimates total more than 4,000 a week -- are likely to get much worse as the perpetrators hone their skills and new weaknesses in popular platforms are discovered and exploited.. . .
DDoS attackers raising the bar  18 June 2001 
Source: ZDNet eWeek - Posted by Jen Olson   
Distributed denial-of-service attacks-which by some estimates total more than 4,000 a week-are likely to get much worse as the perpetrators hone their skills and new weaknesses in popular platforms are discovered and exploited. As vendors such as Asta Networks Inc. and . . .
<< Start < Prev 76 77 78 Next > End >>

Results 751 - 760 of 837


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Why Silicon Valley Hackers Still Won’t Work With the Military, and Vice Versa
Bad movie: Hackers can raid networks with burnt Blu-Rays
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.