Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: September 15th, 2014
Linux Security Week: September 8th, 2014
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

EPIC/GILC Urge Europe Over Cybercrime Treaty  19 October 2000 
Source: Newsbytes - Posted by Dave Wreski   
Members of the Members of the Global Internet Liberty Campaign (GILC) will today urge the Council of Europe to reconsider a draft treaty on cybercrime. The international coalition of civil liberties and human rights organizations, which includes the Electronic Privacy Information . . .
Expert Predictions for Security Trends in 2001  18 October 2000 
Source: SANS - Posted by Dave Wreski   
Security Trends for 2001 - authoritative predictions from three sources. This PDF file contains comments from Alan Paller, Marcus Ranum, and others on the security trends we can expect to see in the coming year.
Hacker elected to ICANN board  17 October 2000 
Source: USA Today - Posted by Dave Wreski   
In November, the ultimate ICANN outsider will become one of its ultimate insiders. When Andy Mueller-Maguhn of Germany takes his seat on the ICANN (International Corporation for Assigned Names and Numbers) board, he says he'll start tearing down the Internet governing . . .
BSDCon's BSD System Security tutorial  17 October 2000 
Source: BSD Today - Posted by Benjamin D. Thomas   
The topics covered where pretty comprehensive. Alan started with an outline of what is computer crime and then ended up with a quick guide to the latest script kiddie software. This, believe it or not, included running Nessus (a new script . . .
Andy Mueller-Maguhn elected to ICANN board  11 October 2000 
Source: ZDNet - Posted by Benjamin D. Thomas   
The first open balloting of board members to the non-profit group overseeing the Internet's name and address system led on Tuesday to the election of five regional directors, including a German hacker. The five new grass-roots members, each representing a major . . .
The Big RSA Patent Expiration Party  18 September 2000 
Source: [LWN] - Posted by Dave Wreski   
The cryptorights folks are holding a party in San Francisco, California on September 21st." The last of the Big Crypto Patents --the RSA algorithm-- will officially expire and enter the Public Domain on 20 September 2000 (at midnight local time), two . . .
Palante's DEFCON 8 CTF server  09 August 2000 
Source: palante - Posted by Dave Wreski   
The system had the same account and password as last year. There was a trivial vulnerable program in the home directory, resulting in a root shell. The kernel had been modified to include a form of access control called DTE which . . .
DefCon 8 / Las Vegas Coverage  07 August 2000 
Source: - Posted by Dave Wreski   
Marc Blumenauer writes, "till today I did not find any useful information about the past DefCon VIII. I was there, and therefore I decided to write my own review and published exclusive images (256!) on my www site. please feel free . . .
GOP 's computer security reality  03 August 2000 
Source: InfoWorld - Posted by Benjamin D. Thomas   
The secret service won't be the only high-profile security group in Philadelphia at the Republican National Convention. A computer security organization will sound the alarm over the increasing vulnerability of America's network-based society on Wednesday. . . .
EU, European Parliament Tussle Over Data Privacy  11 July 2000 
Source: Computer User - Posted by Benjamin D. Thomas   
The European Parliament's de facto rejection of a so-called safe harbor plan to promote data transfers between the European Union and the US has waxed into an unprecedented balance of power issue between the parliament and the European Commission.
<< Start < Prev 37 38 39 Next > End >>

Results 361 - 370 of 383


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Today's Security Hacks Are After More Than Bank Info
How Boston Children's Hospital Hit Back at Anonymous
SNMP DDoS Scans Spoof Google Public DNS Server
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.