Internet Productivity Suite: Open Source Security - Trust Internet Productivity Suite's open source architecture to give you the best security and productivity applications available. Collaborating with thousands of developers, Guardian Digital security engineers implement the most technologically advanced ideas and methods into their design.
LINUX ADVISORY WATCH - This week, advisories were released for qpopper, openssl, php4, bzip2, ImageMagick, bind, netpbm, gxine, imap4d, elfutils, gnutls, and postgresql. The distributors include Debian, Fedora, Gentoo, and Red Hat.
LinuxSecurity.com Feature Extras:
Introduction: Buffer Overflow Vulnerabilities - Buffer overflows are a leading type of security vulnerability. This paper explains what a buffer overflow is, how it can be exploited, and what countermeasures can be taken to prevent the use of buffer overflow vulnerabilities.
Getting to Know Linux Security: File Permissions - Welcome to the first tutorial in the 'Getting to Know Linux Security' series. The topic explored is Linux file permissions. It offers an easy to follow explanation of how to read permissions, and how to set them using chmod. This guide is intended for users new to Linux security, therefore very simple.
The Tao of Network Security Monitoring: Beyond Intrusion Detection - The Tao of Network Security Monitoring is one of the most comprehensive and up-to-date sources available on the subject. It gives an excellent introduction to information security and the importance of network security monitoring, offers hands-on examples of almost 30 open source network security tools, and includes information relevant to security managers through case studies, best practices, and recommendations on how to establish training programs for network security staff.
Bulletproof Virus Protection - Protect your network from costly security breaches with Guardian Digital’s multi-faceted security applications. More then just an email firewall, on demand and scheduled scanning detects and disinfects viruses found on the network. Click to find out more!
Take advantage of our Linux Security discussion
list! This mailing list is for general security-related questions and comments.
To subscribe send an e-mail to
Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headline.
What is the point of encryption if you don’t know who for? | ||
30th, May, 2005
Dr. Walter, Head of Cryptography for Comodo Inc. and chair of the Trusted Computing Group (TCG) Peripheral Working Group, has clarified the relationship between encryption and authentication. The blurred definition to date has split the Certificate Authority industry into two groups. Authorities such as Comodo and VeriSign compete head to head, to deliver high assurance digital certificates whilst other groups concentrate on the low assurance market. |
||
Sentry CD - A different firewall approach | ||
30th, May, 2005
If you want to set up a Linux-based firewall, there's no need to run a bloated distribution that installs everything but the kitchen sink. If you are not afraid to get your hands dirty, and like having total control over your system, then Sentry Firewall CD (SFCD) is just what you need. It is a highly configurable, bootable CD that takes a minimalist approach to firewalling. |
||
Many unaware of browser-security link | ||
1st, June, 2005
Many American online computer users are unaware that choice of browser affects Internet security, and few switch browsers even when they know the risk, a Norwegian study said Monday. |
||
Network Security to Take Top Spot | ||
1st, June, 2005
Criminals aren't the only ones benefiting from the onslaught of threats that bombard corporate networks. Security vendors are also reaping the benefits. |
||
Zombie machines used in 'brutal' SSH attacks | ||
2nd, June, 2005
It's a tedious activity that can put the best of IT administrators to sleep. But as security and compliance manager for a large U.S. healthcare organization, Adam Nunn has learned to study his network activity logs religiously. He knows that when the bad guys work overtime to break his defenses, those logs can be the first sign of trouble. |
||
An Introduction to Securing Linux with Apache, ProFTPd and Samba | ||
2nd, June, 2005
While the vast majority of Linux users are hard-core techies, some may be using Linux because they want to try something new, are interested in the technology, or simply cannot afford or do not want to use Microsoft Windows. |
||
Review: FreeBSD 5.4 | ||
1st, June, 2005
One of the oldest Unix-like operating systems, FreeBSD, continues its advancement with the sixth release in the FreeBSD-5 series. Its developers have added nothing major, but have made many modifications, fixing a number of problems introduced in previous releases. FreeBSD 5.4 is the best release since 5.1, but it still may not be ready for prime time. |
||
A good morning with: Theo de Raadt | ||
2nd, June, 2005
Everybody know that you're the OpenBSD and OpenSSH GURU and creator, one of most famous and used secure operating system nowaday. Why you created them? What did you need many years ago from os world when you created OpenBSD? What inspired you to write from scratch OpenBSD and OpenSSH? Read Full Text news/vendors-products/a-good-morning-with-theo-de-raadt |
||
Employee Training & Education Can Mitigate Threats | ||
31st, May, 2005
“Many Internet threats are easily avoidable and just executed by employees who are simply unaware of their presence. Once briefed on basic Internet security, it is equally important to keep your employees educated as well. When new threats arise, send out memos alerting each employee of the threat, how to identify it, and what to do if and when they have it, |