Linux Cryptography
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
This would have been fun to attend! Declan McCullaugh writes ..."Take about 140 cryptographers, fly them to a remote Caribbean island, mix well with beach parties, endless supplies of rum punch, and toss in . . .
Certainly sounds like a step in the right direction. "The United States will let a computer scientist put instructions for writing a powerful computer data-scrambling program on his Web site, but his high-profile lawsuit challenging U.S. export restrictions on . . .
Gateway and eSoft will collaborate to bring business applications to Linux. "eSoft, Inc. (Nasdaq: ESFT), the developer of the TEAM Internet Linux software suite, announced a strategic alliance Wednesday with Gateway, Inc. (NYSE: GTW) to advance Linux-based Internet software and . . .
Red Hat has released an enterprise version of Linux that is developed to work with specific server applications, such as Oracle 8i, Computer Associates products, and SAP R/3. "The Red Hat Linux Enterprise Edition product line is a collaborative effort . . .
This SecurityPortal article discusses digital signatures, including the problems associated with them, and their adoption in businesses. . . .
One small step backwards in electronic freedom. Thomas C. Greene writes..."FBI Director Louis Freeh remains determined to require cryptography users to register their keys so that the Bureau can crack their secret files whenever a judge can be persuaded . . .
Here's info on a new 3Com ethernet card that has encryption built-in. Does Linux support this card and the encryption features on it? It includes IPSec and 3DES encryption support. Email us at This email address is being protected from spambots. You need JavaScript enabled to view it. and we'll post the . . .
This is a very interesting article about the future of cryptography. David Lammers writes ... "At the Intel Developer Forum, Intel unveiled a copy protection scheme that will add a layer of encryption between the system and . . .
As we know, mobile security is a big problem. Rupert Collins-White writes..."Wireless devices will soon be able to reference digital certificates held on servers, boosting security for mobile e-commerce applications, thanks to version 1.3 of the Wireless Application Protocol . . .
Protecting access to Defense Department information systems with public-key infrastructure software tokens presents an "enormous problem'" because of the scale of the effort involved in issuing digital certificates to a uniformed and civilian work force that totals more than a . . .
This E-Commerce Times article writes, "The U.S. government and many states are now passing Uniform Electronic Transaction Act (UETA) laws that recognize the legal validity of electronic signatures and transactions." . . .
The Cleo Products Group have announced they have added "support for the open-source platform to its Cleo 3780Plus product. Cleo 3780Plus, which will now work with Linux, UNIX and Windows, allows B2B e-commerce operations to exchange such data as . . .
"Separate papers at the FPGA 2000 conference here this week highlighted how programmable logic can be used to create or crack data encryption schemes. One paper outlined attempts to implement a cryptography algorithm in programmable hardware, while another showed how . . .
Here is another article on the DeCESS issue by C. Scott ... "A judge's decision to ban a DVD-playing Linux program and all discussion about it outrages the free-software community." . . .
This ComputerCurrents article discusses the features in PGP (Pretty Good Privacy) encryption software, including email, file, and disk encryption. . . .
This NW article discusses the results from a recent survey, "Two years from now, companies surveyed expect e-commerce to bring in an average of 41% of their total revenue, and they'll be dedicating an average of $83 million per year . . .
Part one of this five-part article, found on LinuxToday, discusses what's required to build an e-commerce solution using Linux. . . .
Kurt Seifried has written an article on the basics of cryptography, as well as some tips on how to use the various crypto applications for Linux. . . .
E-Commerce Times is reporting that Red Hat and Computer Associates are porting their eTrust Access Control software to Red Hat Linux. Their product will reportedly "allow Red Hat Linux users to protect critical data and online business applications with . . .
Due to the increasingly complex nature of data transmission, it has becomes a necessity to use various levels and types of cryptography within the scope of many environments. Onc critical issue that arrises from this is that it is . . .