LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 21st, 2014
Linux Security Week: April 7th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Organizations/Events
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



SANS Spring Schedule of Events  03 April 2001 
Source: SANS - Posted by Pete O'Hara   
Here's the list of SANS events from current date through August, 2001.
 
Testing Your Mettle: The Six-Hour, 250-Question CISSP Exam  03 April 2001 
Source: CertCites - Posted by Jen Olson   
Does an alphabet soup of acronyms, which stand for certifications that you've obtained, follow your signature? Are you wondering which, if any, are really valuable? Are you contemplating a worthwhile certification challenge? Have you been working in the information system security . . .
 
Security alliance chock-full of holes  01 February 2001 
Source: ZDNet / eWeek - Posted by Nick DeClario   
On the surface, IT-ISAC sounds wonderful, but there's something wrong with this picture. Each of these companies might provide a general idea as to the kinds of attacks that it is receiving. But no company in its right mind will contribute . . .
 
EPIC, Privacy International join forces in Privacy.org  17 January 2001 
Source: ComputerUser - Posted by Dave Wreski   
The Electronic Privacy Information Center (EPIC) has teamed up with Privacy International in relaunching a Web site that aims to become the clearinghouse for all privacy-related news worldwide. The new site, http://www.privacy.org, hosts links to hundreds of news . . .
 
Cybersecurity Goes Cooperative  16 January 2001 
Source: Wired - Posted by Dave Wreski   
Nineteen leading tech firms have created an information-sharing conglomerate aimed at countering the growing number of electronic attacks on U.S. companies. The information technology sector on Tuesday became the third area of the economy to create its own "Information Sharing and . . .
 
The Security Summit Gang  09 January 2001 
Source: Marcus Ranum - Posted by Dave Wreski   
These are portraits Marcus Ranum took at the first ever computer security summit, held at Bill Cheswick's house in the summer of 1998, I believe. Ever wonder what Dan Farmer or Wietse Venema look like? Marcus adds, "Due to unfortunate lack . . .
 
Survey: CIOs not worried about security  04 January 2001 
Source: ComputerWorld - Posted by Dave Wreski   
Although U.S. companies lose billions of dollars every year as a result of cybercrimes committed by internal and external hackers, more than 90% of CIOs polled in a recent survey said they have confidence in their company's network security. According to . . .
 
CERT warns of looming DDoS attacks  01 December 2000 
Source: Fairfax IT - Posted by Dave Wreski   
In its clearest signal yet that it may be bracing for a massive attack, computer network security group CERT issued an advisory today asking system administrators to prepare systems to block denial of service attacks. The advisory, titled DenialofService Vulnerabilities in . . .
 
CERT: Denial-of-Service Vulnerabilities in TCP/IP Stacks  30 November 2000 
Source: CERT - Posted by Dave Wreski   
A variety of denial-of-service vulnerabilities has been explored and documented by BindView's RAZOR Security Team. These vulnerabilities allow attackers to consume limited resources on victim machines. BindView's RAZOR Security Team has referred to these vulnerabilities as Naptha vulnerabilities. Denial-of-service attacks . . .
 
Honeynet Project's 'honey pot' a sweet success in trapping hacker attacks  27 November 2000 
Source: InfoWorld - Posted by Dave Wreski   
During just one month of monitoring, the Honeynet team's "honey pot," which poses as a real network to attract hackers, had been scanned by hundreds of unique IP addresses looking for two particular ports: UDP (User Datagram Protocol) port 137, used . . .
 
<< Start < Prev 34 35 36 Next > End >>

Results 331 - 340 of 369
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Fixing OpenSSL's Heartbleed flaw will take MONTHS, warns Secunia
Even the most secure cloud storage may not be so secure, study finds
Targeted Attack Uses Heartbleed to Hijack VPN Sessions
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.