Internet Productivity Suite: Open Source Security - Trust Internet Productivity Suite's open source architecture to give you the best security and productivity applications available. Collaborating with thousands of developers, Guardian Digital security engineers implement the most technologically advanced ideas and methods into their design. Click to find out more!
LINUX ADVISORY WATCH - This week, advisories were released for hpsockd, viewvcs, nfs-util, cyrus-imapd, netatalk, gaim, rhpl, ttfonts, mc, udev, gnome-bluetooth, rsh, mysql, libpng, glib, gtk, postgresql, shadow-utils, perl, mirrorselect, drakxtools, dietlib, gzip, rp-ppoe, openssl, ImageMagick, samba, and cups. The distributors include Debian, Fedora, Gentoo, Mandrake, Red Hat, SuSE, Trustix, and Turbo Linux.
LinuxSecurity.com Feature Extras:
Vincenzo Ciaglia Speaks Security 2004 - Vincenzo Ciaglia of Linux Netwosix talks about this year of Linux Security. A full immersion in the world of Linux Security from many sides and points of view.
Mass deploying Osiris - Osiris is a centralized file-integrity program that uses a client/server architecture to check for changes on a system. A central server maintains the file-integrity database and configuration for a client and at a specified time, sends the configuration file over to the client, runs a scan and sends the results back to the server to compare any changes. Those changes are then sent via email, if configured, to a system admin or group of people. The communication is all done over an encrypted communication channel.
AIDE and CHKROOTKIT -Network security is continuing to be a big problem for companies and home users. The problem can be resolved with an accurate security analysis. In this article I show how to approach security using aide and chkrootkit.
Bulletproof Virus Protection - Protect your network from costly security breaches with Guardian Digital’s multi-faceted security applications. More then just an email firewall, on demand and scheduled scanning detects and disinfects viruses found on the network. Click to find out more!
Take advantage of our Linux Security discussion
list! This mailing list is for general security-related questions and comments.
To subscribe send an e-mail to
Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headline.
Zero Viruses In 2005? | ||
17th, December, 2004
|
||
Linux has fewer bugs, analysis shows | ||
14th, December, 2004
|
||
PGP Corporation Co-Sponsors HIPAA Educational Series | ||
14th, December, 2004
|
||
Kenai Systems Focuses on Web Services Vulnerabilities With Release Of Two Products | ||
16th, December, 2004
Kenai Systems Inc., a maker of Web services vulnerability tools, today announced the release of two products: eXamine, and eXamineST. The products enable developers to import WSDL files and test them for Web services security vulnerabilities. news/vendors-products/kenai-systems-focuses-on-web-services-vulnerabilities-with-release-of-two-products |
||
Security research suggests Linux has fewer flaws | ||
14th, December, 2004
|
||
Linux, Security Certifications Gain Popularity | ||
14th, December, 2004
|
||
Study: Linux the Safest Out There | ||
15th, December, 2004
|
||
Fashion-Technology Fusion Threatens Security | ||
15th, December, 2004
Employers need thoughtful policies to control which fashionable personal tech items they'll allow on the premises. |
||
Bali bomber writes How-To | ||
16th, December, 2004
|
||
SAML: The Secret to Centralized Identity Management | ||
17th, December, 2004
|
||
DirecTV hacker sentenced to seven years | ||
13th, December, 2004
A Canadian man was sentenced to seven years in a U.S. prison this week after admitting he led a sophisticated satellite TV piracy ring that produced and sold thousands of hacked smart cards in the U.S. and Canada. news/government/directv-hacker-sentenced-to-seven-years |
||
Cyber-Security Office Calls for More Clout | ||
15th, December, 2004
The office in charge of cyber-security in the Department of Homeland Security is planning to continue moving ahead on the agenda the agency has already set. news/government/cyber-security-office-calls-for-more-clout |
||
Feds Failing To Protect Against Cybersecurity Threats | ||
16th, December, 2004
Attention to cybersecurity has gone from one extreme to the other. Soon after 9/11, the news media was filled with shrieking and arm-waving about "cyberterrorism." Eventually, sensible people ralized that the notion of cyberterrorism is just plain silly. Terrorists are interested in being terrifying, they want to set off bombs and send bodies flying and blood flowing. news/government/feds-failing-to-protect-against-cybersecurity-threats |
||
DHS cyber security lagging | ||
17th, December, 2004
The U.S. Department of Homeland Security is having some homeland cyber security issues on its systems providing remote access to telecommuters, according to a newly-released report by the DHS Inspector General's office. news/government/dhs-cyber-security-lagging |
||
Students uncover dozens of Unix software flaws | ||
16th, December, 2004
|
||
Securing Wireless E-Records | ||
13th, December, 2004
Few understand how tough it can be to lock down wireless networks better than Stephen Lewack, director of technical services and communications at Columbus Regional Healthcare System. Lewack is protecting a growing number of wireless devices throughout the Georgia hospital, which includes more than 400 in-patient beds, more than 200 long-term care beds, and a pharmacy. |
||
WEP: Dead Again, Part 1 | ||
15th, December, 2004
This article is the first of a two-part series that looks at the new generation of WEP cracking tools for WiFi networks, which offer dramatically faster speeds for penetration testers over the previous generation of tools. In many cases, a WEP key can be determined in seconds or minutes. Part one, below, compares the latest KoreK based tools that perform passive statistical analysis and brute-force cracking on a sample of collected WEP traffic. Next time, in part two, we'll look at active attack vectors, including a method to dramatically increase the rate of packet collection to make statistical attacks even more potent. |
||
Wi-Fi Hacker Sentenced To Nine Years | ||
17th, December, 2004
|
||