Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: February 27th, 2015
Linux Security Week: February 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

ICANN To Gauge Privacy Concerns Over 'Whois' Database  13 June 2001 
Source: NewsBytes - Posted by Dave Wreski   
The organization charged with managing the worldwide Domain Name System (DNS) has launched a study to gauge privacy concerns raised by the plethora of personal information contained in the "Whois" database, a publicly searchable resource used to determine the identity of . . .
OpenBSD and ipfilter still fighting over license disagreement  07 June 2001 
Source: Newsforge - Posted by Dave Wreski   
Maintaining the openness of OpenBSD got a little more complicated recently when the project leader of what may be one of the most popular modules in OpenBSD decided to re-word his home-grown license to specifically disallow modifications to the source code . . .
OpenPGP Alliance omits PGP Security  31 May 2001 
Source: The Register - Posted by Jen Olson   
An organisation formed to promote compatibility between different implementations of OpenPGP standard does not include Network Associates, which is the main supplier of PGP-based encryption products for business. The OpenPGP Alliance, which was founded by PGP creator Phil Zimmermann, doesn't include . . .
Attrition: We've served our time  21 May 2001 
Source: Attrition Staff - Posted by Benjamin D. Thomas   
The Attrition staff outlines their decision to no longer maintain the Web defacement archive. "During this time, we have struggled to keep up various other sections of Attrition that have been a core part of the site. As the mirror grew and began to consume more resources, the other sections have found themselves on the backburner and rarely updated. In essence, what was once a hobby site run in spare time for fun has turned into a beleaguring second job. A job that comes with more headache, complaints, criticisms, slander and attacks than productive output or reward. . . .
Users mold security benchmark  15 May 2001 
Source: ComputerWorld - Posted by Dave Wreski   
The problem with IT security benchmarks is that the reference point is a constantly shifting target as new technologies and threats emerge. And that's an especially difficult problem to overcome, said corporate security systems managers. They are examining the fruits of . . .
RSA show highlights managed security  10 April 2001 
Source: InfoWorld - Posted by Pete O'Hara   
With security expertise becoming an increasingly expensive but important commodity, security companies plan to focus on managed security services as a key selling point at the RSA Conference 2001 this week in San Francisco. In addition, companies are pushing systems to . . .
Internet security experts gather in San Francisco  09 April 2001 
Source: Nando Times - Posted by Pete O'Hara   
The RSA Conference, named for the Bedford, Mass.-based security company that puts it together, began Sunday and runs through Thursday. In another sign that security has become important business, the sponsors include Intel, Microsoft, Hewlett-Packard, IBM and Compaq. "I think the . . .
SANS Spring Schedule of Events  03 April 2001 
Source: SANS - Posted by Pete O'Hara   
Here's the list of SANS events from current date through August, 2001.
Testing Your Mettle: The Six-Hour, 250-Question CISSP Exam  03 April 2001 
Source: CertCites - Posted by Jen Olson   
Does an alphabet soup of acronyms, which stand for certifications that you've obtained, follow your signature? Are you wondering which, if any, are really valuable? Are you contemplating a worthwhile certification challenge? Have you been working in the information system security . . .
Security alliance chock-full of holes  01 February 2001 
Source: ZDNet / eWeek - Posted by Nick DeClario   
On the surface, IT-ISAC sounds wonderful, but there's something wrong with this picture. Each of these companies might provide a general idea as to the kinds of attacks that it is receiving. But no company in its right mind will contribute . . .
<< Start < Prev 34 35 36 Next > End >>

Results 341 - 350 of 386


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Ramnit Botnet Shut Down
Snowden: Spy Agencies ‘Screwed All of Us’ in Hacking Crypto Keys
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.