LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: July 25th, 2014
Linux Advisory Watch: July 18th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Hacks/Cracks
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Hackers' Tricks to Avoid Detection  14 November 2000 
Source: News.com - Posted by Dave Wreski   
Hackers are not only clever in how they invade servers; they are also devious in how they disguise their attacks. Malicious attackers use a variety of evasive techniques, which we will examine in this column so that we, as . . .
 
Should You Strike Back?  14 November 2000 
Source: ComputerWorld - Posted by Dave Wreski   
There's a war brewing in cyberspace. Make that a Netwar, so dubbed in Countering the New Terrorism, a book published last year by The RAND Corp., a Santa Monica, Calif.-based nonprofit research group formed during World War II.. . .
 
Web War: When Point and Shoot Becomes Point and Click  14 November 2000 
Source: PostNet.com - Posted by Benjamin D. Thomas   
The online world has entered a new phase. At first it was a combination playground, library and meeting house for scientists and soldiers, an inviolate virtual world. Companies later tried to turn it into a mall. Now, it's becoming a borderless . . .
 
Nanoteq's hacking course - 'for the good guys'  10 November 2000 
Source: IT Web - Posted by Jen Olson   
After the huge success of presenting the course in Malaysia and recently in South Africa, the Nanoteq Training Academy is again offering its Applied Hacking Techniques course to the industry. The course has been designed to give insight into the minds . . .
 
Users show some sympathy to Microsoft over security  09 November 2000 
Source: CNN - Posted by Jen Olson   
Bashing Microsoft Corp. may be popular sport on some issues, but the internal security breach that the company disclosed late last month has some corporate information technology users waxing sympathetic. Several users last week said the incident -- in which a . . .
 
Online Music Safeguards Withstand Hackers  09 November 2000 
Source: Washington Post - Posted by Jen Olson   
A coalition of companies in the software and recording industries declared yesterday that three of five technologies aimed at stopping the online piracy of music had so far survived attack by hackers seeking to win $10,000 for cracking the security measures. . . .
 
The new age of hacktivism  08 November 2000 
Source: ZDNet - Posted by Jen Olson   
Politicians may not pander to them and experts may discount their opinions, but online vandals are getting the message out about what they think is important: Increasingly, that's politics. On the eve of the U.S. elections, vandals defaced the home pages . . .
 
After hack, Microsoft mistakes linger  08 November 2000 
Source: ZDNet - Posted by Dave Wreski   
After further review, security experts last week said enterprises can glean some new lessons from the Microsoft Corp. hacking saga. First and foremost, if you get hacked, don't do what Microsoft did. According to at least a dozen security experts contacted . . .
 
Microsoft plays down second hack attack  07 November 2000 
Source: vnunet.com - Posted by Chris Pallack   
Microsoft's internal network has been broken into for the second time in as many weeks by a hacker who exploited the fact that the software giant had not applied its own security patches.
 
Cybercrime soars in the UK  07 November 2000 
Source: VNUNet - Posted by Dave Wreski   
Cybercrime accounted for half of all fraud committed in the UK in the first six months of this year, according to a legal expert. Steven Philippsohn, senior litigation partner at law firm Philippsohn, Crawfords, Berwald, said this figure would rise as . . .
 
<< Start < Prev 202 203 204 Next > End >>

Results 2011 - 2020 of 2139
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
How Hackers Hid a Money-Mining Botnet in Amazonís Cloud
Homeland Security gets into software security
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.