Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Cloaking devices designed for wary Web shoppers  06 November 2000 
Source: Star Tribune - Posted by Dave Wreski   
The Internet's first anonymous shopping tools are going live this fall. These are various virtual masks that cloak people's credit-card numbers -- and, in some cases, their real names and addresses -- from the prying eyes of online merchants. At the . . .
Clinton, GOP Compromise On Net Filtering  02 November 2000 
Source: Computer User - Posted by Benjamin D. Thomas   
Although the government spending bill carrying a clause requiring Internet filtering on school and library computers that are federally funded is wrapped up in partisan melees, the White House and Republican lawmakers appear to have reached common ground on the filtering . . .
Computer forensics the latest ploy to monitor employees  31 October 2000 
Source: Lexis-Nexis - Posted by Benjamin D. Thomas   
Moving beyond merely monitoring employees' Internet use, many of the nation's largest companies are quietly assembling teams of computer investigators who specialize in covertly copying employees' hard drives and combing them for evidence of workplace wrongdoing. These high-tech investigators employ tools . . .
Security group alleges breach in bank's Web site  25 October 2000 
Source: - Posted by Dave Wreski   
Customer credit card numbers of Bank One Online are at risk of exposure to malicious hackers, an Internet security group charged Tuesday. The Web site of the fourth-largest U.S. bank lets customers in most cities check their accounts by entering a . . .
Net Privacy Bill Called 'Trojan Horse'  25 October 2000 
Source: Washington Post - Posted by Chris Pallack   
The legislation began as an effort to protect people like Amy Boyer, a New Hampshire woman who was slain by a man who tracked her down after buying her Social Security number on the Internet.In May, Sen. Judd Gregg (R-N.H.) proposed . . .
Employers can read your email from today  24 October 2000 
Source: ZDNet - Posted by Dave Wreski   
Starting today employers can read workers' email without their consent, but heavyweights including the IoD want changes From Tuesday, new regulations give employers the power to eavesdrop on the email communications of their staff, a legal shift . . .
Zero-Knowledge open sources Freedom  24 October 2000 
Source: ZDNet - Posted by Dave Wreski   
Privacy technology firm Zero-Knowledge Systems announced that it had released the code to the Linux version of its privacy software, Freedom 2.0, Monday. Freedom is a client for a network that allows users to browse anonymously. Not even . . .
Putting privacy in perspective  23 October 2000 
Source: ZDNet - Posted by Dave Wreski   
There's a lot of sound and fury these days about privacy and the Net -- about how your privacy is going to be seriously compromised soon, if it's not already; about how innovations in cell phones and global positioning satellite systems . . .
FBI Still Hunting With Carnivore  23 October 2000 
Source: PCWorld - Posted by Benjamin D. Thomas   
The U.S. Federal Bureau of Investigation is still developing its Carnivore Internet surveillance tool, according to FBI documents obtained by the Electronic Privacy Information Center through a Freedom of Information Act lawsuit. The FBI is now creating "Enhanced Carnivore" under a . . .
Mark of Zoro  18 October 2000 
Source: AntiOffline - Posted by Ryan W. Maple   
J. Oquendo contributes: "With the inception of the F.B.I.'s Carnivore, many people have overlooked the fact the C.I.A. is unleashing a tool which makes Carnivore a lightweight contender on the security intervention scene." The article says "watch for more . . .
<< Start < Prev 118 119 120 Next > End >>

Results 1181 - 1190 of 1311


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
FBI Quietly Removes Recommendation To Encrypt Your Phone
And the prize for LEAST SECURE BROWSER goes to ... Chrome!
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.