Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: December 19th, 2014
Linux Advisory Watch: December 12th, 2014
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Server Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Building an E-Commerce Site Part 3: Catalogs and Shopping Carts  09 June 2000 
Source: DevShed - Posted by Team   
In this installment, we add scripts to let the user browse our product catalog and we let them order our products. After completing this installment, you will have experience navigating the product catalog, viewing product details, managing the shopping cart, . . .
Linux Kernel Security Bug Discovered  08 June 2000 
Source: --   - Posted by Team   
A serious bug has been discovered in the Linux kernel that can be used by local users to gain root access. The problem, a vulnerability in the Linux kernel capability model, exists in kernel versions up to and including version 2.2.15. According to Alan Cox, a key member of the Linux developer community, "It will affect programs that drop setuid state and rely on losing saved setuid, even those that check that the setuid call succeeded."

To ensure that this vulnerability cannot be exploited by programs running on Linux, Linux users are advised to update to kernel version 2.2.16 immediately. Information on "capabilities" are discussed in the Capabilities FAQ We also recently ran a story on a capabilities-based operating system that is worth reading.

BSD Based Operating Systems: IPCS Vulnerability  08 June 2000 
Source: CIAC   -- - Posted by Team   
This advisory is for all 386BSD-derived OSes, including all versions of FreeBSD, NetBSD and OpenBSD. "An unprivileged local user can cause every process on the system to hang during exiting. In other words, after the system call is issued, no . . .
Security scare as outsiders get access to NetBSD software password  07 June 2000 
Source: Fairfax IT - Posted by Team   
Developers of the NetBSD open source operating system say a recent security breach did not compromise the software's source code. NetBSD developer and project spokesman Charles Hannum has confirmed that a key developer's password was "discovered" by outsiders.
Hardening Linux Machines For Web Services  06 June 2000 
Source: themestream [LinuxToday] - Posted by Team   
This is a introductory article on securing your Linux server. It starts with physical security then briefly discusses network security. "Your objective is to add as many rings or layers as possible, making the potential cracker take more . . .
Web security ups ante, goes nuclear  01 June 2000 
Source: ZDNet -- Submitted by - Posted by Team   
British Internet companies are increasingly turning to complexes capable of withstanding a nuclear onslaught in the battle against computer hackers and other threats, according to one security consultant. . . .
E-Commerce Solutions: An Apache Overview  31 May 2000 
Source: ApacheToday [LinuxToday] - Posted by Team   
This ApacheToday article discusses what issues are involved with Apache to configure an E-Commerce site. "So, E-Commerce is the buzzword, but how do you actually produce an E-Commerce site? ... Here's a quick guide to some of the issues . . .
Update: Blocking "Killer Resume"  31 May 2000 
Source: - Posted by Team   
Jose Nazario has updated the .cf/.mc patch on his mirror site to include "Killer Resume" and was kind enough to share the fix with us. The patch, designed to block the ILOVEYOU worm and related worm/virus medleys, works . . .
NIPC Tool to Detect the mstream DDoS  26 May 2000 
Source: NIPC - Posted by Team   
The potential represented by the "mstream" Distributed Denial of Service (DDoS) exploit is a serious and continuing threat. This advisory provides an update to a previously delivered NIPC DDoS detection tool that now allows users to identify the presence of . . .
Secure Deletion of Data  25 May 2000 
Source: --   - Posted by Team   
With the use of increasingly sophisticated encryption systems, an attacker wishing to gain access to sensitive data is forced to look elsewhere for information. One avenue of attack is the recovery of supposedly erased data from magnetic media or random-access . . .
<< Start < Prev 88 89 90 Next > End >>

Results 881 - 890 of 935


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.