Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Security Projects
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Security Mailing Lists Come Under Fire  26 March 2003 
Source: eweek - Posted by Adam Chalemian   
A Danish security company, angry over what it perceives as censorship on several popular mailing lists, is launching "a revolution to remove SecurityFocus and CERT from power. . .
Bait N Switch Honeypot  23 March 2003 
Source: Albert Gonzalez - Posted by Benjamin D. Thomas   
Albert Gonzalez submits, "The Bait N Switch Honeypot system is a multifaceted attempt to take honeypots out of the shadows of the network security model. We attempt to make them a participant in your systems defense. To do this, we are . . .
Military Academies Get Hands-on Experience Defending Cyberspace  19 March 2003 
Source: TheRetriever - Posted by Eric Lubow   
The Cyber Defense Exercises were started over a conversation between military officers at a Dairy Queen in Waxahachie, Texas outside of Texas A&M in 1997. Initially they joked about how cool it would be to have a cyber war competition between . . .
IETF creates anti-spam research group  05 March 2003 
Source: IT World - Posted by Jen Olson   
Underscoring growing concern over spam, the Internet Engineering Task Force (IETF) has created a new Anti-Spam Research Group (ASRG) that aims to put unsolicited commercial e-mail in its crosshairs by setting standards for spam detection and potential legislation. . . .
Linux Push On Security Standard  04 March 2003 
Source: - Posted by Eric Lubow   
IBM, Oracle and Red Hat are backing efforts to ensure the Linux operating system achieves security assurances recognised by the Australian government. IBM and Oracle are working to get Linux certified under the International Common Criteria for Information Technology Security . . .
IBM: IP Security Validator  19 February 2003 
Source: IBM alphaWorks - Posted by Eric Lubow   
IP Security Validator is an experimental tool that allows validation of Virtual Private Network (VPN) configurations between two network interfaces. As with testing connectivity using the Ping program, IP Security Validator enables verification and validation of VPN configurations and their connectivity.. . .
New Wireless Standard Same Issues  14 February 2003 
Source: eWeek - Posted by Eric Lubow   
Broadband wireless access took another step forward late last month when the IEEE approved 802.16a, an amendment that adds features to the group's 802.16 standard that defines the WirelessMAN air interface specification. 802.16 was developed by the IEEE's 802.16 Working . . .
IBM Announces Commitment to Common Criteria Security Certification of Linux across IBM eServer Platf  13 February 2003 
Source: IBM - Posted by Dave Wreski   
Bernadette Rose submits, " IBM today announced that it will work with the Linux community to enter the Common Criteria certification process for the Linux operating system early this year and proceed with a progressive plan for certifying Linux at increasing security levels through 2003 and 2004. . . .
Open Source Honeypots: Learning with Honeyd  12 February 2003 
Source: Honeynet Project - Posted by Nick DeClario   
Lance Spitzner submits the latest from the Honeynet Project. "Honeypots are an exciting new technology. They allow us to turn the tables on the bad guys, we can take the initiative. In the past several years there has been growing interest in exactly what this technology is and how it works. The purpose of this paper is to introduce you to honeypots and demonstrate their capabilities. We will begin by discussing what a honeypot is and how it works, then go into detail using the OpenSource solution Honeyd.. . .
Cyclone: A Safe Dialect of C  01 February 2003 
Source: AT&T Labs Research - Posted by Dave Wreski   
Cyclone is a programming language based on C that is safe, meaning that it rules out programs that have buffer overflows, dangling pointers, format string attacks, and so on. High-level, type-safe languages, such as Java, Scheme, or ML also provide safety, but they don't give the same control over data representations and memory management that C does (witness the fact that the run-time systems for these languages are usually written in C.). . .
<< Start < Prev 61 62 63 Next > End >>

Results 611 - 620 of 744


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.