Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: February 27th, 2015
Linux Security Week: February 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Security Projects
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

New Wireless Standard Same Issues  14 February 2003 
Source: eWeek - Posted by Eric Lubow   
Broadband wireless access took another step forward late last month when the IEEE approved 802.16a, an amendment that adds features to the group's 802.16 standard that defines the WirelessMAN air interface specification. 802.16 was developed by the IEEE's 802.16 Working . . .
IBM Announces Commitment to Common Criteria Security Certification of Linux across IBM eServer Platf  13 February 2003 
Source: IBM - Posted by Dave Wreski   
Bernadette Rose submits, " IBM today announced that it will work with the Linux community to enter the Common Criteria certification process for the Linux operating system early this year and proceed with a progressive plan for certifying Linux at increasing security levels through 2003 and 2004. . . .
Open Source Honeypots: Learning with Honeyd  12 February 2003 
Source: Honeynet Project - Posted by Nick DeClario   
Lance Spitzner submits the latest from the Honeynet Project. "Honeypots are an exciting new technology. They allow us to turn the tables on the bad guys, we can take the initiative. In the past several years there has been growing interest in exactly what this technology is and how it works. The purpose of this paper is to introduce you to honeypots and demonstrate their capabilities. We will begin by discussing what a honeypot is and how it works, then go into detail using the OpenSource solution Honeyd.. . .
Cyclone: A Safe Dialect of C  01 February 2003 
Source: AT&T Labs Research - Posted by Dave Wreski   
Cyclone is a programming language based on C that is safe, meaning that it rules out programs that have buffer overflows, dangling pointers, format string attacks, and so on. High-level, type-safe languages, such as Java, Scheme, or ML also provide safety, but they don't give the same control over data representations and memory management that C does (witness the fact that the run-time systems for these languages are usually written in C.). . .
Santa Considering Move to Linux  26 December 2002 
Posted by Eric Lubow   
North Pole - Citing concerns about security and licensing costs, Santa Claus is considering migrating his computer systems from Microsoft Windows to Linux. . .
Feds, firms unveil test for security pros  28 November 2002 
Source: - Posted by Benjamin D. Thomas   
Security certification got a big boost last September, when the Bush Administration published a draft form of the National Strategy to Secure Cyberspace. The strategy highlights the need for more security training and better ways to certify knowledge. . . .
OWASP CodeSeeker - An Open Source Application Firewall and IDS  25 November 2002 
Source: OWASP - Posted by Jen Olson   
The Open Web Application Security Project (OWASP) are pleased to annouce the imminent availability of CodeSeeker, an Application Level Firewall and Intrusion Detection System (AFWIDS) for Linux, Win32 and Solaris.. . .
Open-Source Trojans: A Growing Problem?  25 November 2002 
Source: InfoSecurity Magazine - Posted by Jen Olson   
Experts say the insertion of Trojans into two popular tools reinforces the need to run readily available programs, such as MD5 hashes, to ensure that code hasn't been altered. Experts recommend using MD5 hashes to expose Trojans. This and similar programs, such as MD4, SHA and SHA-1, continually compare codes generated by "healthy" software to hashes of programs in the field.. . .
BIND / crypt_blowfish Openwall Linux Info  17 November 2002 
Source: Openwall Project / Solar Designer - Posted by Chris Pallack   
Yesterday I've put out the BIND 4.9.10-OW2 patch, which includes the patch provided by ISC and thus has the two recently announced vulnerabilities affecting BIND 4 fixed. Another recent update is crypt_blowfish 0.4.5.. . .
Industry Briefs: Grounds for Identity  08 November 2002 
Source: LinuxJournal - Posted by Adam Chalemian   
A year ago, identity was mostly the concern of privacy and crypto guys. The only company taking much public interest was Microsoft, which was busy scaring everybody with its Passport identity management system and the Hailstorm initiative that went along with . . .
<< Start < Prev 61 62 63 Next > End >>

Results 611 - 620 of 738


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.