LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 21st, 2014
Linux Security Week: April 7th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Organizations/Events
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Real hackers go to Usenix  21 November 2000 
Source: SunWorld - Posted by Dave Wreski   
Tired of conferences not living up to your expectations? Then you haven't been to Usenix. In this month's Wizard's Guide to Security, Carole Fennelly reports that Usenix's recent security conference offered interesting and accessible talks -- and a who's who of . . .
 
Multiple Denial-of-Service Problems in ISC BIND  14 November 2000 
Source: CERT - Posted by Dave Wreski   
Several security vulnerabilities have been found in the latest version of BIND. CERT has now issued an advisory outlining those vulnerabilities and how to resolve them. "The CERT Coordination Center has recently learned of two serious denial-of-service vulnerabilities in the Internet . . .
 
Warner Losh resigns as FreeBSD security officer  09 November 2000 
Source: FreeBSD - Posted by Dave Wreski   
Kris Kennaway succeeds Warner Losh as FreeBSD security officer. " I am resigning as FreeBSD's Security Officer. Over the past several years I have enjoyed watching FreeBSD's security improve. The change in attitude towards security issues of FreeBSD has . . .
 
Security dominates agenda at federal Linux conference  31 October 2000 
Source: ZDNet - Posted by Dave Wreski   
Security was a hot topic at Monday's first-ever federal Linux user's conference. The news that Microsoft Corp.'s network had been breached and that hackers had gained access to source code underscores the need for effective security systems to protect large institutions . . .
 
Presentations from SANS Network Security 2000  30 October 2000 
Source: SANS - Posted by Benjamin D. Thomas   
Now you can download some late arriving presentations from SANS Network Security 2000 last October 15 - 22 in Monterey. Just click on the title of the presentation you're interested in to access the PDF file. Brief session descriptions are provided . . .
 
BSDCon's BSD System Security tutorial  19 October 2000 
Source: BSD Today - Posted by Dave Wreski   
This year's BSDCon is being held at the Monterey Hyatt, in Monterey Ca. The first tutorial was a two-day tutorial covering BSD System Security. For the most part the classes are intensive and there was a lot of ground to cover. . . .
 
EPIC/GILC Urge Europe Over Cybercrime Treaty  19 October 2000 
Source: Newsbytes - Posted by Dave Wreski   
Members of the Members of the Global Internet Liberty Campaign (GILC) will today urge the Council of Europe to reconsider a draft treaty on cybercrime. The international coalition of civil liberties and human rights organizations, which includes the Electronic Privacy Information . . .
 
Expert Predictions for Security Trends in 2001  18 October 2000 
Source: SANS - Posted by Dave Wreski   
Security Trends for 2001 - authoritative predictions from three sources. This PDF file contains comments from Alan Paller, Marcus Ranum, and others on the security trends we can expect to see in the coming year.
 
Hacker elected to ICANN board  17 October 2000 
Source: USA Today - Posted by Dave Wreski   
In November, the ultimate ICANN outsider will become one of its ultimate insiders. When Andy Mueller-Maguhn of Germany takes his seat on the ICANN (International Corporation for Assigned Names and Numbers) board, he says he'll start tearing down the Internet governing . . .
 
BSDCon's BSD System Security tutorial  17 October 2000 
Source: BSD Today - Posted by Benjamin D. Thomas   
The topics covered where pretty comprehensive. Alan started with an outline of what is computer crime and then ended up with a quick guide to the latest script kiddie software. This, believe it or not, included running Nessus (a new script . . .
 
<< Start < Prev 34 35 36 Next > End >>

Results 341 - 350 of 369
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.