Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: February 27th, 2015
Linux Security Week: February 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Security Projects
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Bastille Linux Release Version 1.2  16 June 2001 
Source: LinuxPR - Posted by Benjamin D. Thomas   
"The Bastille Linux development team today announced the release of Bastille Linux 1.2, a hardening script for multiple Linux distributions. With this release, Bastille Linux delivers on the full promise of simplified, automated security administration for Linux systems.. . .
CryptoBox project: Making the Web more anonymous  15 June 2001 
Source: NewsForge - Posted by Benjamin D. Thomas   
A quiet project hosted on is attempting to give Internet users a level of anonymity that hasn't yet been achieved. Founders of the CryptoBox project are dedicating it to Internet users in censorship-happy countries who face getting prosecuted for sharing . . .
EnGarde Secure Linux: The Design of the Secure Linux Platform  29 May 2001 
Source: Guardian Digital - Posted by Benjamin D. Thomas   
Guardian Digital, the company that brings you, recently released EnGarde Secure Linux. Engineered from the ground up, EnGarde incorporates intrusion alert abilities, a complete suite of e-business applications using AllCommerce, mail and DNS management for an entire organization, improved authentication and access control, strong cryptography, and complete SSL secure Web-based administration capabilities.. . .
A common language for security vulnerabilities  25 May 2001 
Source: ZDNet - Posted by Dave Wreski   
When hackers want to breach your systems, they typically look for well-known security flaws and bugs to exploit. In the past, vendors and hackers gave different names to the same vulnerabilities. One company might package a group of five vulnerabilities into . . .
Fighting the new electronic war  02 May 2001 
Source: CNET - Posted by Jen Olson   
In 1992, Lance Spitzner joined the U.S. Army with a single goal in mind: to become a tank officer. Ever since childhood, he had loved learning about tanks, and the Army gave him an opportunity to get up-close and personal with . . .
IBM Dream: Self-Policing Networks  27 April 2001 
Source: Wired - Posted by Ryan W. Maple   
Imagine a world where complicated computer networks need little or no interaction with humans: a world where computers can update and maintain their own systems, shield themselves from misfortune caused by human error and acts of nature, and fiercely protect themselves . . .
PGP Security's NAI Labs Partner With National Security Agency to Develop Secure Linux  09 April 2001 
Source: PR Newswire - Posted by Dave Wreski   
NAI today announced they are joining with the National Security Agency (NSA) and its other partners to further develop the NSA's Security-Enhanced Linux (SELinux) prototype. The $1.2 million will be paid over the life of the two-year contract, and the work will focus on research and development to improve the security of open-source operating system platforms, the core of Internet infrastructures that have become business critical in today's economy.. . .
Gnutella Targeted for Piracy Control  30 March 2001 
Source: LA Times - Posted by Nick DeClario   
Gnutella, on the other hand, is one of several decentralized file-sharing networks that aren't businesses and have no central control. That means there's nobody at these networks for the labels to sue--just the consumers who use them. Security experts say that . . .
RSBAC v1.1.1 Released  30 March 2001 
Source: Amon Ott - Posted by Dave Wreski   
Rule Set Based Access Control (RSBAC) version 1.1.1 has been released. Information and downloads are available from . .
The security implications of open source software  29 March 2001 
Source: IBM - Posted by Dave Wreski   
Natalie Whitlock talks about the incongruence of closed security systems, and the open source solution. She discusses Eric Raymond's ideas, the famous "back door" in Microsoft's FrontPage, the concept of peer review, and the open source dilemma that no one is . . .
<< Start < Prev 67 68 69 Next > End >>

Results 681 - 690 of 738


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
DDoS Exploit Targets Open Source Rejetto HFS
Gemalto Confirms It Was Hacked But Insists the NSA Didnít Get Its Crypto Keys
Hackers exploit router flaws in unusual pharming attack
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.