LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: December 12th, 2014
Linux Security Week: December 9th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Privacy
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Security Flaw Found At E-Trade Internet stock brokerage moves to correct problem  26 September 2000 
Source: SF Gate - Posted by Dave Wreski   
A freelance Internet security expert said he found a potential cybernightmare in online broker E-Trade Group's Internet operations -- a programming flaw that could have given hackers easy access to customer accounts.. . .
 
Speaking for security  26 September 2000 
Source: BBC News - Posted by Dave Wreski   
A small UK company has created a speech recognition system that can fit comfortably on a smartcard and do its job using nothing more than the humble processing power of the chip on the card.. . .
 
MSNBC Privacy Summary  26 September 2000 
Source: MSNBC - Posted by Dave Wreski   
MSNBC has put together a summary of the most significant events to affect privacy on the net in the last week or two. It covers Carnivore, a GeoCities faux pas, ACLU and wiretap issues, government and net privacy bills, and more. . . .
 
Defanging Carnivore  25 September 2000 
Source: Salon - Posted by Dave Wreski   
An interview with Network ICE CEO Robert Graham. "Graham released to the general public the source code to "Altivore," a program that mimics all the capabilities of Carnivore. Part protest against Carnivore's potential for invasions of privacy and part defensive measure . . .
 
The :CueCat Bar Code Reader  22 September 2000 
Source: PrivacyFoundation - Posted by Dave Wreski   
Here's a good overall summary of the :CueCat issues. "The Privacy Foundation recently completed a technical evaluation of the :CueCat bar code reader. This handheld device, which is similar in appearance to a computer mouse, is a product of Digital:Convergence Corp. . . .
 
Senate Posts Guide to Privacy Protection  22 September 2000 
Source: USA Today - Posted by Dave Wreski   
Senate Judiciary Committee Chair Orrin Hatch on Wednesday touted identity scrubbers, self-destructing e-mail and other online privacy protection tools, as an alternative to stepped-up policing of the Web. Releasing a consumer guide to state-of-the-art methods of curbing personal data giveaways, the . . .
 
Network Ice posts do-it-yourself Carnivore kit  21 September 2000 
Source: TheRegister - Posted by Dave Wreski   
Just so you know what a carpet-soiling, leg-humping snippy little lapdog the FBI's Carnivore really is, firewall outfit Network Ice has hacked out a bit of C source code called 'Altivore', enabling anyone to cobble up an e-mail sniffer with virtually the same underwhelming capabilities and based on the same principles. . . .
 
Open-source Carnivore clone released  21 September 2000 
Source: ZDNet - Posted by Dave Wreski   
Internet service providers looking to sidestep the controversy surrounding the FBI's Carnivore system for sniffing Internet communications will soon be able to use an open-source program that also conforms to the needs of law enforcement.. . .
 
U.S. Senators Release Net Privacy Guide  21 September 2000 
Source: E-Commerce Times - Posted by Dave Wreski   
This is a great 40-page document by Orrin Hatch that describes what the government is doing about privacy, tools that can be used to protect your privacy, and a commendation to the public sector for what it's done to date to . . .
 
Online Privacy Tools Are Within Reach  21 September 2000 
Source: Techweb - Posted by Benjamin D. Thomas   
A slew of privacy software applications are hitting the market or are in final testing to address the growing concerns of Internet users about how their data is collected. Some of the tools highlighted at a Commerce Department conference Tuesday . . .
 
<< Start < Prev 118 119 120 Next > End >>

Results 1191 - 1200 of 1291
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
The Difference Between Wi-Fi Security Protocols: WPA2-AES vs WPA2-TKIP
Segmenting for security: Five steps to protect your network
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.