LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: December 22nd, 2014
Linux Advisory Watch: December 19th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Intrusion Detection
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



How to stop a service denial attack before it stops you  04 July 2001 
Source: GCN - Posted by Dave Wreski   
It's not easy to defend a federal Web server against distributed service denial attacks, but it?s not impossible either. For years now, the government has been under the gun in an undeclared cyberwar with hackers around the globe. The simplest and . . .
 
Stemming the DoS flood  02 July 2001 
Source: ZDNet - Posted by Pete O'Hara   
One the most aggravating Internet security threats today is a distributed denial-of-service attack--a flood of bogus network traffic that can effectively shut down a Web site. Far from going away, the phenomenon is evolving in different permutations. But new tools are . . .
 
Introduction to Network-Based Intrusion Detection Systems Using Snort  28 June 2001 
Source: UnixReview - Posted by Dave Wreski   
This article will provide a basic overview of today's ID systems. It doesn't aim to be complete but gives a good starting point for further information. I will talk about different architecture approaches for ID systems, host and network based, to improve overall security for your business.. . .
 
Eliminating IDS Babble  28 June 2001 
Source: InfoSec Magazine - Posted by Jen Olson   
Simply put, there are as many different IDS applications as there are attack vectors (figuratively speaking, of course). As many organizations have discovered, multiple IDS solutions are needed to monitor different platforms and networks. This diversity inhibits enterprise-wide pooling and correlation . . .
 
Socket man: Steve Gibson's DDoS attacks  20 June 2001 
Source: Newsforge - Posted by Dave Wreski   
I dig Steve Gibson. Not only is this renegade computer security consultant a great storyteller, but he's one of the best Net advocates out there, a regular Abbie Hoffman of the binary age. Still, his latest crusade has me wondering if he isn't starting to value Microsoft-bashing over basic honesty.. . .
 
Security pros dig in for new DoS attacks  19 June 2001 
Source: ZDNet UK - Posted by Dave Wreski   
Despite new tools to fight off invaders, DoS attacks are only going to get worse - thanks to tools freely available on the Internet. Distributed denial-of-service attack -- which by some estimates total more than 4,000 a week -- are likely to get much worse as the perpetrators hone their skills and new weaknesses in popular platforms are discovered and exploited.. . .
 
DDoS attackers raising the bar  18 June 2001 
Source: ZDNet eWeek - Posted by Jen Olson   
Distributed denial-of-service attacks-which by some estimates total more than 4,000 a week-are likely to get much worse as the perpetrators hone their skills and new weaknesses in popular platforms are discovered and exploited. As vendors such as Asta Networks Inc. and . . .
 
New Tool Will Expose Security-Slacker ISPs  17 June 2001 
Source: NewsBytes - Posted by Pete O'Hara   
The problem of denial of service attacks could be solved overnight if Internet service providers cleaned up their act, a security gadfly said Tuesday. Steve Gibson, president of Gibson Research Corp., is developing a free tool that will hold ISP's feet to the fire if they have not implemented a security technique known as "egress filtering." . . .
 
Net Security Conference: Denial Of Service Wars Heat Up  08 June 2001 
Source: Newsbytes - Posted by Nick DeClario   
The arms race between hackers and security personnel continues unabated as each side constantly strives to top the capabilities of the other - especially when it comes to denial of service (DoS) attacks. That is the message from the "anti-hacking" symposium . . .
 
Expert: Windows XP could unleash wave of DoS attacks  06 June 2001 
Source: InfoWorld - Posted by Jen Olson   
The implementation of Unix Sockets is troubling, Gibson wrote, because they are frequently used in two aspects of DoS attacks: falsifying IP addresses -- a technique called spoofing that makes the source of an attack harder to pinpoint, and allowing computers . . .
 
<< Start < Prev 76 77 78 Next > End >>

Results 751 - 760 of 834
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
Report: U.S. planning “proportional response” to Sony hack, blamed on North Korea
Heartbleed, Shellshock, Tor and more: The 13 biggest security stories of 2014
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.