LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Government
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Intrusion detection rules drafted  16 February 2001 
Source: FCW - Posted by Jen Olson   
The National Institute of Standards and Technology released Monday new draft guidance on intrusion-detection systems, outlining all the factors agencies need to consider when integrating these security systems into their networks. The guidance is part of a series of special . . .
 
Who better to test privacy software than the world's spies?  13 February 2001 
Source: MSNBC - Posted by Jen Olson   
How's this for a curious pairing? Stephen Hsu and his partners at SafeWeb Inc. launch a Web site offering the utmost in Internet privacy - and then hook up with the notoriously intrusive Central Intelligence Agency. The CIA, in this case, wants to use a SafeWeb program to mask its own movements on the Internet, so it can gather information incognito.. . .
 
Bush weighs future of computer security office  13 February 2001 
Source: GovExec - Posted by Jen Olson   
The Bush administration is reviewing whether to continue the operations of the government office that coordinates critical infrastructure policy, according to the head of the office, which is slated for termination this fall. John Tritak, director of the Critical Infrastructure . . .
 
FBI dumps Carnivore - but in name only  12 February 2001 
Source: ZDNet - Posted by Ryan W. Maple   
The FBI has dressed its online wolf in sheep's clothing, changing the name of its controversial email surveillance system -- known up until now as Carnivore. Carnivore now goes by the less beastly moniker of DCS1000, drawn from the . . .
 
Feds Say Fidel Is Hacker Threat  09 February 2001 
Source: Wired - Posted by Jen Olson   
These must be jittery times for anyone in the military who uses the Internet. Not only do they have to guard against Love Bug worms and security holes in Microsoft Outlook -- now they've got to worry about Fidel Castro . . .
 
Feds Buckle Down on Customer Information Security  08 February 2001 
Source: Relevant Technologies - Posted by Benjamin D. Thomas   
In an effort to improve the state of consumer privacy, the Federal Reserve Board, the FDIC, the OCC, and the Office of Thrift Supervision on January 17 announced that they have put together joint guidelines to safeguard confidential customer information. The . . .
 
Report urges overhaul for national security  05 February 2001 
Source: FCW - Posted by Jen Olson   
Recognizing that national security is no longer the sole concern of the Defense Department, a new report by a federal commission pushes for a vast reorganization of the federal government and an overhaul of the appropriations process. The report by the . . .
 
NSA attempting to design crack-proof computer  01 February 2001 
Source: ZDNet - Posted by Pete O'Hara   
Software emulation firm VMware announced it has teamed up with researchers at the National Security Agency to create a nearly crack-proof computer that can place sensitive data in virtual vaults inside the PC. The concept, assuming it works, would streamline the . . .
 
Feds use biometrics against Super Bowl fans  01 February 2001 
Source: TheRegister - Posted by Dave Wreski   
Super Bowl 2001 fans were secretly treated to a mass, biometric scan in which video cameras tied to a temporary law-enforcement command centre digitised their faces and compared them against photographic lists of known malefactors. Everyone entering Raymond James Stadium in . . .
 
Report Slams Computer D.C. Agency 's Security Practices  31 January 2001 
Source: Newsbytes - Posted by Benjamin D. Thomas   
Computer systems at more than 60 agencies in the District of Columbia remain at risk because of shoddy computer security practices at the DC Department of Public Works, the General Accounting Office (GAO) said today. In a comprehensive audit of . . .
 
<< Start < Prev 127 128 129 Next > End >>

Results 1271 - 1280 of 1432
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
FBI Quietly Removes Recommendation To Encrypt Your Phone
And the prize for LEAST SECURE BROWSER goes to ... Chrome!
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.