LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 7th, 2014
Linux Advisory Watch: April 4th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Security Projects
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



IBM Dream: Self-Policing Networks  27 April 2001 
Source: Wired - Posted by Ryan W. Maple   
Imagine a world where complicated computer networks need little or no interaction with humans: a world where computers can update and maintain their own systems, shield themselves from misfortune caused by human error and acts of nature, and fiercely protect themselves . . .
 
PGP Security's NAI Labs Partner With National Security Agency to Develop Secure Linux  09 April 2001 
Source: PR Newswire - Posted by Dave Wreski   
NAI today announced they are joining with the National Security Agency (NSA) and its other partners to further develop the NSA's Security-Enhanced Linux (SELinux) prototype. The $1.2 million will be paid over the life of the two-year contract, and the work will focus on research and development to improve the security of open-source operating system platforms, the core of Internet infrastructures that have become business critical in today's economy.. . .
 
Gnutella Targeted for Piracy Control  30 March 2001 
Source: LA Times - Posted by Nick DeClario   
Gnutella, on the other hand, is one of several decentralized file-sharing networks that aren't businesses and have no central control. That means there's nobody at these networks for the labels to sue--just the consumers who use them. Security experts say that . . .
 
RSBAC v1.1.1 Released  30 March 2001 
Source: Amon Ott - Posted by Dave Wreski   
Rule Set Based Access Control (RSBAC) version 1.1.1 has been released. Information and downloads are available from http://www.rsbac.org. . .
 
The security implications of open source software  29 March 2001 
Source: IBM - Posted by Dave Wreski   
Natalie Whitlock talks about the incongruence of closed security systems, and the open source solution. She discusses Eric Raymond's ideas, the famous "back door" in Microsoft's FrontPage, the concept of peer review, and the open source dilemma that no one is . . .
 
Companies send employees to 'hacker' workshops  26 March 2001 
Source: NandoTimes - Posted by Jen Olson   
The best way to keep a hacker from breaking into a computer system from the outside may just be to have a hacker on the inside. That's what John Brozycki and Darien Ford's company figured when it paid $7,000 so they . . .
 
Developers call for web security standard  22 March 2001 
Source: vnunet - Posted by Pete O'Hara   
A group of security developers has called for an industry standard for internet security testing. The group, called Ideahamster, which includes a mixture of security experts and developers, has suggested that the introduction of such a standard would make it easier . . .
 
Uncovering the secrets of SE Linux: Part 2  21 March 2001 
Source: IBM - Posted by Dave Wreski   
In an uncharacteristic move, the U.S. National Security Agency (NSA) recently released a security-enhanced version of Linux -- code and all -- to the open source community. Part 2 of this developerWorks exclusive delves deeper into the code, dissecting how the . . .
 
Honeynet Project Forensic Challenge Results  20 March 2001 
Source: Dave Dittrich - Posted by Ryan W. Maple   
Today Dave Dittrich of the Honeynet Project announced the results of the "Honeynet Fornesic Challenge". The results of all submitted reports are available on the page. Dave also talks about how the Honeynet Project is going to continue using . . .
 
Passive Analysis of SSH (Secure Shell) Traffic  19 March 2001 
Source: Openwall Project - Posted by Dave Wreski   
This advisory demonstrates several weaknesses in implementations of SSH (Secure Shell) protocols. When exploited, they let the attacker obtain sensitive information by passively monitoring encrypted SSH sessions. The information can later be used to speed up brute-force attacks on . . .
 
<< Start < Prev 67 68 69 Next > End >>

Results 661 - 670 of 713
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Canadians arrest a Heartbleed hacker
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.