LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: December 22nd, 2014
Linux Advisory Watch: December 19th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Hacks/Cracks
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



The next security threat: Web applications  29 January 2001 
Source: ZDNet - Posted by Jen Olson   
The next wave of hacking schemes focuses on a vulnerable and extremely difficult area to defend: Web applications. Application hacks take advantage of vulnerabilities that normally occur in many HTML pages. A person hacking into a Web page could, for example, . . .
 
From Outlaw to Consultant  29 January 2001 
Source: NY Times - Posted by Jen Olson   
... there may be no tale so poignant as that of John T. Draper, the mythical "phone phreak" who became a national figure in 1971 after being one of the first to discover that a toy whistle in the Cap'n Crunch . . .
 
Web war rages over DVD-cracking site  28 January 2001 
Source: USA Today - Posted by Dave Wreski   
In a move that free-speech activists hope will be trendsetting, Internet service provider Verio is standing up to the movie industry by refusing to remove a Web site the Motion Picture Association of America says is illegal. Many ISPs, especially smaller . . .
 
Internet Exploits Defined  26 January 2001 
Source: ZDNet - Posted by Dave Wreski   
Start with the basics. "No longer does a hacker have to huddle in front of a glowing monitor. Today's hacker has at his disposal a literal arsenal of fully automated tools, through which he can gain access to your system without . . .
 
French hackers break SDMI, publish results  24 January 2001 
Source: LWN / julienstern.org - Posted by Jen Olson   
Two French hackers, Julien Stern and Julien Boeuf, have broken the Secure Digital Music Initiative's watermarking scheme. However, being French, they (1) have declined to sign SDMI's nondisclosure agreement, and (2) are not subject to the Digital Millennium Copyright Act. So they have published their findings, both in French and in English. . . .
 
Security patches aren't being applied  24 January 2001 
Source: ZDNet - Posted by Jen Olson   
As a result, this easily avoidable problem has reached near-epidemic proportions. Making matters more frustrating is knowing that so many losses could have been easily avoided with a few mundane but crucial steps. "I would put patching in the top two . . .
 
Reverse Engineering: Necessary Function Or Illegal Activity?  23 January 2001 
Source: TechWeb - Posted by Nick DeClario   
A key ruling last October by the 9th U.S. Circuit Court of Appeals, located in San Mateo, Calif., affecting the home video game sector is having a direct impact on the entire software industry. The ruling, which upholds engineers' rights to . . .
 
Pentaguard defaces multiple government Web sites in US, UK and AU  23 January 2001 
Source: Attrition.org - Posted by Dave Wreski   
Tonight the Attrition.org staff has mirrored one of the largest, most systematic defacements of worldwide government servers on the Web. The defacers, known as Pentaguard, took out various government Web sites from 3 countries - the United Kingdom, Australia, and the . . .
 
Linux' Bug Problem: Getting the Fixes Out  23 January 2001 
Source: BusinessWeek - Posted by Dave Wreski   
Still, the continuing spread of Ramen raises some serious questions about the ability of the open-source community to live up to its security boasts. Linux supporters have long claimed the transparent nature of open-source development produces more secure software and fixes . . .
 
Systematic attack over weekend targets government sites on three continents  23 January 2001 
Source: CNN - Posted by Benjamin D. Thomas   
The attack was one of the largest, most systematic defacements of worldwide government servers on the Web, Attrition.org said on its site. The sites were replaced with the hackers' logo and the message "presents... the largest .gov and .mil mass . . .
 
<< Start < Prev 199 200 201 Next > End >>

Results 1991 - 2000 of 2194
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
Report: U.S. planning “proportional response” to Sony hack, blamed on North Korea
Heartbleed, Shellshock, Tor and more: The 13 biggest security stories of 2014
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.