Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: December 19th, 2014
Linux Advisory Watch: December 12th, 2014
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Server Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Another Distributed DOS Tool  17 March 2000 
Source: Sven Dietrich & Neil Long & David Dittrich - Posted by Team   
Updated. This is an analysis of the "Shaft" distributed denial of service (DDoS) tool. Denial of service is a technique to deny access to a resource by overloading it, such as packet flooding in the network context. Denial of service . . .
Hackers crack online porn filters  16 March 2000 
Posted by Team   
A company that makes popular software to block children from Internet pornography is suing two computer experts for distributing a method for children to deduce their parents' password and access those forbidden Web sites. . . .
Backups and Data Recovery, Part 2  13 March 2000 
Source: Linux Journal - Posted by Team   
System backups are the oft-forgotten step of system security. This Linux Journal article discusses using your CD-RW drive to make a backup of your system. . . .
Sendmail, Inc. Introduces Secure Switch  13 March 2000 
Source: Newsalert - Posted by Team   
Secure Switch provides state of the art server-to-server encryption technology so businesses can now safely use the Internet for transmitting sensitive information to partners, suppliers and employees. By automatically encrypting the SMTP connection between trusted servers, end users are freed . . .
Trustix AS Releases High Performance and Secure Linux Operating System  13 March 2000 
Source: LinuxPR - Posted by Team   
Trustix Secure Linux is developed specifically for server applications such as e-business servers, web servers, mail servers, DNS servers and Internet access servers, with demand for the highest security and reliability. . . .
Sendmail 8.10 Security Features  08 March 2000 
Source: - Posted by Team   
The general link above points to the new features in "the most powerful open source sendmail release ever". This link talks about the new general security features, and this one talks about the new anti-spam features. . . .
DOD Will Require Testing Of Security Products  06 March 2000 
Source: 32BitsOnline - Posted by Team   
"In a move to shore up security, the Department of Defense (DOD) will require that by July 1, 2002, DOD agencies buy only information assurance products that have been evaluated by accredited national laboratories, according to a directive issued this . . .
Using Apache ProxyPass to access servers behind a Masquarading host  05 March 2000 
Source: LinuxFocus - Posted by Team   
This article shows how a web-server behind a firewall can be accessed without compromising security. It discusses configuring the Apache ProxyPass option to allow external hosts to an internal network. . . .
Finger-pointing begins in Windows 2000 Bug Claims  04 March 2000 
Source: - Posted by Team   
Microsoft has been unable to douse allegations that one of the hotly anticipated technologies in Windows 2000 Server has a security hole. "If this had been a legitimate security bug, Microsoft would have admitted that," said Peter Houston, Microsoft's group . . .
Backups and Data Recovery, Part 1  04 March 2000 
Source: Linux Journal - Posted by Team   
Part 1 of this LJ series discusses "backup strategies, tools, and ways to make the whole process a bit less unpleasant." [Found on linuxtoday] . . .
<< Start < Prev 91 92 93 Next > End >>

Results 911 - 920 of 935


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Report: U.S. planning “proportional response” to Sony hack, blamed on North Korea
Heartbleed, Shellshock, Tor and more: The 13 biggest security stories of 2014
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.