Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: July 28th, 2014
Linux Advisory Watch: July 25th, 2014
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Agencies act to secure the future  21 June 2000 
Source: FCW - Posted by Benjamin D. Thomas   
In the charge to protect computer systems against cyberattacks, the National Security Agency and the State Department are two prime examples of agencies that have taken a proactive approach. NSA is one of the federal agencies that have taken the . . .
CSIS opens wallet to battle cyberterrorists  16 June 2000 
Source: Ottawa Citizen - Posted by Benjamin D. Thomas   
Canada's intelligence agency plans "significant investments" in advanced technology to try to keep pace with well-equipped terrorists and spies. The Canadian Security Intelligence Service said in its annual report yesterday that the growing use of modern communications, computers and encryption by . . .
Information on SANS Security DC2000  02 June 2000 
Source: SANS - Posted by Team   
SANS Security DC2000 will be here July 5-10th, 2000. It is located at the JW Marriot Hotel in Washington DC. SANS will provide "In-depth training for people interested in developing skills and confidence as technical security professionals." . . .
Improving Reliability and Security of the Internet  20 May 2000 
Source: Global Internet Project (GIP) - Posted by Team   
A group of leading Internet executives said today that cyber-related problems like the ILOVEYOU virus are international in nature; therefore, effective information security solutions must be pursued on an international basis. The Global Internet Project (GIP) released a statement at . . .
Are you looking for CISSP certification?  17 May 2000 
Source: Posted by:Benjamin D. Thomas - Posted by Team, an email group organizer, has a group that would appeal to individuals interested in obtaining CISSP certification. CISSPStudy1, meets at 1-3pm on Saturdays. They continue to stress that 'NEW MEMBERS ARE ALWALYS WELCOME.' "List members participate . . .
Call For Papers  16 May 2000 
Source: NDSS - Posted by Team   
The Network and Distributed System Security Symposium is looking for authors for information on PKI, security policy, authentication, firewalls, and a handful of other exciting topics. . . .
All Secure!  11 May 2000 
Source: Government Computer News - Posted by Team   
Here's an article for people trying to justify security to their management. It talks about getting involved with the SANS organization, making the case for security, virus detection, PKI and E-Commerce, and more. "The first rule of IT . . .
Phrack Number 56 Released  01 May 2000 
Source: Phrack - Posted by Team   
The latest issue of Phrack, a premier underground security magazine, has been released. This issue covers great information on Distributed Denial of Service attacks (including sample code), bypassing StackGuard, a tool that "eliminates buffer overflows", introduction to Pluggable Authentication . . .
Students Learn the Basics of Security  29 March 2000 
Source: --    - Posted by Team   
More than 20 students recently sat in a room on the 12th floor of a New York office building to learn how to hack into Linux systems. But it wasn't an underground session run by computer criminals; instead, these students . . .
Barry Diller's do's and don'ts for e-commerce success  05 March 2000 
Source: PC Week - Posted by Team   
The keynote for the Internet Electronic Commerce Expo in NY last week provides some tips on avoiding problems when developing an "e-business" front-end for your company. The article is worth reading, but I happen to think the 1 hour . . .
<< Start < Prev 37 38 Next > End >>

Results 361 - 370 of 372


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Hackers Plundered Israeli Defense Firms that Built Iron Dome Missile Defense System
Internet of things big security worry, says HP
Boffins build FREE SUPERCOMPUTER from free cloud server trials
Insecure Connections: Enterprises hacked after neglecting third-party risks
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.