Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: February 27th, 2015
Linux Security Week: February 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

DefCon 8 / Las Vegas Coverage  07 August 2000 
Source: - Posted by Dave Wreski   
Marc Blumenauer writes, "till today I did not find any useful information about the past DefCon VIII. I was there, and therefore I decided to write my own review and published exclusive images (256!) on my www site. please feel free . . .
GOP 's computer security reality  03 August 2000 
Source: InfoWorld - Posted by Benjamin D. Thomas   
The secret service won't be the only high-profile security group in Philadelphia at the Republican National Convention. A computer security organization will sound the alarm over the increasing vulnerability of America's network-based society on Wednesday. . . .
EU, European Parliament Tussle Over Data Privacy  11 July 2000 
Source: Computer User - Posted by Benjamin D. Thomas   
The European Parliament's de facto rejection of a so-called safe harbor plan to promote data transfers between the European Union and the US has waxed into an unprecedented balance of power issue between the parliament and the European Commission.
What's the hat got to do with it?  06 July 2000 
Source: LinuxWorld - Posted by Dave Wreski   
Joe Barr takes off his rose-colored glasses and discovers deception and darkness are old hat in the world of computer security. This week I'm eating crow because I didn't follow my gut instinct on a story I wrote about Linux security . . .
Agencies act to secure the future  21 June 2000 
Source: FCW - Posted by Benjamin D. Thomas   
In the charge to protect computer systems against cyberattacks, the National Security Agency and the State Department are two prime examples of agencies that have taken a proactive approach. NSA is one of the federal agencies that have taken the . . .
CSIS opens wallet to battle cyberterrorists  16 June 2000 
Source: Ottawa Citizen - Posted by Benjamin D. Thomas   
Canada's intelligence agency plans "significant investments" in advanced technology to try to keep pace with well-equipped terrorists and spies. The Canadian Security Intelligence Service said in its annual report yesterday that the growing use of modern communications, computers and encryption by . . .
Information on SANS Security DC2000  02 June 2000 
Source: SANS - Posted by Team   
SANS Security DC2000 will be here July 5-10th, 2000. It is located at the JW Marriot Hotel in Washington DC. SANS will provide "In-depth training for people interested in developing skills and confidence as technical security professionals." . . .
Improving Reliability and Security of the Internet  20 May 2000 
Source: Global Internet Project (GIP) - Posted by Team   
A group of leading Internet executives said today that cyber-related problems like the ILOVEYOU virus are international in nature; therefore, effective information security solutions must be pursued on an international basis. The Global Internet Project (GIP) released a statement at . . .
Are you looking for CISSP certification?  17 May 2000 
Source: Posted by:Benjamin D. Thomas - Posted by Team, an email group organizer, has a group that would appeal to individuals interested in obtaining CISSP certification. CISSPStudy1, meets at 1-3pm on Saturdays. They continue to stress that 'NEW MEMBERS ARE ALWALYS WELCOME.' "List members participate . . .
Call For Papers  16 May 2000 
Source: NDSS - Posted by Team   
The Network and Distributed System Security Symposium is looking for authors for information on PKI, security policy, authentication, firewalls, and a handful of other exciting topics. . . .
<< Start < Prev 37 38 39 Next > End >>

Results 371 - 380 of 386


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Why Silicon Valley Hackers Still Won’t Work With the Military, and Vice Versa
Bad movie: Hackers can raid networks with burnt Blu-Rays
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.