This week, perhaps the most interesting articles include "Three tools to help you configure iptables," "," and "."

 


Internet Productivity Suite: Open Source Security - Trust Internet Productivity Suite's open source architecture to give you the best security and productivity applications available. Collaborating with thousands of developers, Guardian Digital security engineers implement the most technologically advanced ideas and methods into their design.


LINUX ADVISORY WATCH - This week, perhaps the most interesting articles include ppxp, oops, libconvert, qpopper, gail, dmraid, openssl, kernel, netpbm, sudo, texinfo, FreeRADIUS, gdb, ImageMagick, Net-SNMP, gxine, evolution, firefox, mozilla, ethereal, and less tif. The distributors include Debian, Fedora, Gentoo, and Red Hat.

LinuxSecurity.com Feature Extras:

Introduction: Buffer Overflow Vulnerabilities - Buffer overflows are a leading type of security vulnerability. This paper explains what a buffer overflow is, how it can be exploited, and what countermeasures can be taken to prevent the use of buffer overflow vulnerabilities.

Getting to Know Linux Security: File Permissions - Welcome to the first tutorial in the 'Getting to Know Linux Security' series. The topic explored is Linux file permissions. It offers an easy to follow explanation of how to read permissions, and how to set them using chmod. This guide is intended for users new to Linux security, therefore very simple.

The Tao of Network Security Monitoring: Beyond Intrusion Detection - The Tao of Network Security Monitoring is one of the most comprehensive and up-to-date sources available on the subject. It gives an excellent introduction to information security and the importance of network security monitoring, offers hands-on examples of almost 30 open source network security tools, and includes information relevant to security managers through case studies, best practices, and recommendations on how to establish training programs for network security staff.


Bulletproof Virus Protection - Protect your network from costly security breaches with Guardian Digital’s multi-faceted security applications. More then just an email firewall, on demand and scheduled scanning detects and disinfects viruses found on the network. Click to find out more!

 

Take advantage of our Linux Security discussion list! This mailing list is for general security-related questions and comments. To subscribe send an e-mail to This email address is being protected from spambots. You need JavaScript enabled to view it. with "subscribe" as the subject.

Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headline.


  Interview with the guru of Python
  26th, May, 2005

 

An italian web magazine interviewed Guido Van Rossum, the guru of Python. An interesting interview has been created.

 

 
  The Crypto Wars are over!
  25th, May, 2005

 

The "crypto wars" are finally over - and we've won!

On 25th May 2005, Part I of the Electronic Communications Act 2000 will be torn out of the statute book and shredded, finally removing the risk of the UK Government taking powers to seize encryption keys.

 

news/cryptography/the-crypto-wars-are-over
 
  'Unhackable' network draws nearer
  26th, May, 2005

 

Scientists have moved one step closer to the "unhackable" network by developing a device that can send single photons in a regular stream over a fiber optic link.

 

news/cryptography/unhackable-network-draws-nearer
 
  Three tools to help you configure iptables
  24th, May, 2005

 

Every user whose client connects to the Internet should configure his firewall immediately after installation. Some Linux distributions include firewall configuration as a part of installation, often offering a set of defaults configurations to choose from. However, to ensure that your machine presents the minimum "attack surface" (a measure of the number of vulnerable ports, user accounts, and sockets exposed to attack) to the predatory inhabitants of the Internet, you may need to do some manual configuration of your firewall. Here are three tools that can help.

 

news/firewall/three-tools-to-help-you-configure-iptables
 
  Shorewall lead developer quits
  24th, May, 2005

 

It is with regret that I announce that Shorewall development and support is officially ended.

Unlike the originators of other successful open source projects, I have not been able to attract a core of people who believe in Shorewall and who are willing to make sacrifices to ensure it's success. That is my weakness and I accept it. But is means that I have been left with trying to develop, document, and support Shorewall almost single-handedly. I cannot do it any more.

 

news/firewall/shorewall-lead-developer-quits
 
  Device Drivers Filled with Flaws, Threaten Security
  27th, May, 2005

 

Operating system vendors and hardware makers should commit more resources toward systematically auditing Windows and Linux device-driver code for flaws, security researchers say. While buffer overflows, a type of memory flaw that can lead to serious vulnerabilities, are quickly being eradicated in critical applications, the flaws are still easily found in device drivers, said David Maynor, a research engineer for Internet Security Systems' X-Force vulnerability analysis group.

 

 
  Vendors 'slow to fix' hyperthreading flaw
  27th, May, 2005

 

A researcher claims that Microsoft and some Linux vendors have put small businesses at risk with their slow reaction to a vulnerability in Intel's hyperthreading chip technology.

 

 
  Feds to fight the zombies
  23rd, May, 2005

 

Remote-controlled "zombie" networks operated by bottom-feeding spammers have become a serious problem that requires more industry action, the Federal Trade Commission is expected to announce on Tuesday.

 

news/network-security/feds-to-fight-the-zombies
 
  Using a Network Analyser as a Security Tool
  27th, May, 2005

 

Every administrator of a corporate LAN of any size these days has already built strong defenses against hackers and virus attacks. But the viruses and hackers continue to get through. Why?

 

 
  Linux Gains Maturity in the Data Center
  24th, May, 2005

 

Businesses certainly profit by using high-quality software that is freely available, and unencumbered by restrictive licensing, so they must keep an eye towards its sustainability. That might mean an occasional donation of equipment, funds, employees' time and know-how, whatever it is you have to offer.

 

news/server-security/linux-gains-maturity-in-the-data-center
 
  Where should security live?
  23rd, May, 2005

 

The facile answer is everywhere. Professional network security managers tend to want to scan at the edges of their networks, and centralize patch management. We amateurs tend to leave it all at the edges, that is, every box we own has security on it. This leaves it up to individual users to manage security programs, making even little children into security managers. It’s not a good solution.

 

 
  Software Industry on the Brink of Choosing Open Source
  23rd, May, 2005

 

Many computer experts agree that computers are less vulnerable to hacking and virus attacks when they run Linux software rather than Microsoft's Windows.

"What is the most important issue for us is, which is the most pragmatic business model for customers?" said Shirish Netke, an executive at Aztec Software in India.

 

 
  Identity theft getting more sophisticated, more profitable
  24th, May, 2005

 

It is the hot crime of the 21st century - and YOU are the target. Sophisticated super-hackers are turning identity theft into a multi-billion-dollar criminal enterprise, plundering data about ordinary people from alumni directories, ATM machines, credit cards, tax returns and myriad other sources. The massive scams are costing American businesses and consumers more than $47 billion a year, according to the Federal Trade Commission.

 

 
  Simplifying Security
  26th, May, 2005

 

It's hard enough to create a new company -- why try to create a new market as well? That’s why we like start-ups that target markets which already exist. In fact, we’ve examined this theme in the last few weeks -- more often than not, start-ups are best served by approaching old problems in new ways. The advantage is obvious: the demand for the products or services is already in place.

 

 
  Experts: Zombies ousting viruses
  26th, May, 2005

 

Speaking at the AusCERT conference in Australia's Gold Coast on Tuesday, Eugene Kaspersky, founder of Kaspersky Labs, said that the influence of organized crime on the malicious software industry has led to a change of tactics. Instead of trying to create viruses and worms that infect as many computers as possible, authors of malicious software are instead trying to infect 5,000 or 10,000 computers at a time to create personalized zombie armies.

 

 
  Public backs ID cards to beat identity theft
  25th, May, 2005

 

The public believes that ID cards are the best solution to identity theft and fraud, according to a survey published this week. More than half of those polled (57%) said ID cards were their first or second preferred method to protect themselves against identity theft, the survey of 1,000 people aged 16 to 64 showed. But George Platt, general manager of US voice automation firm Intervoice, which commissioned the UK survey, warned that ID cards would “do nothing