CRYPTOCard Two-Factor Authentication Are you a Linux consultant with expertise in network security? Join CRYPTOCard's Linux Consultants program and learn about how you can help your clients implement secure authentication solutions. Click here for more information
LinuxSecurity.com Feature Extras:
EnGarde Secure Linux v3.0.7 Now Available - Guardian Digital is happy to announce the release of EnGarde Secure Community 3.0.7 (Version 3.0, Release 7). This release includes several bug fixes and feature enhancements to the Guardian Digital WebTool and the SELinux policy, several updated packages, and several new packages available for installation.
pgp Key Signing Observations: Overlooked Social and Technical Considerations - While there are several sources of technical information on using pgp in general, and key signing in particular, this article emphasizes social aspects of key signing that are too often ignored, misleading or incorrect in the technical literature. There are also technical issues pointed out where I believe other documentation to be lacking. It is important to acknowledge and address social aspects in a system such as pgp, because the weakest link in the system is the human that is using it. The algorithms, protocols and applications used as part of a pgp system are relatively difficult to compromise or 'break', but the human user can often be easily fooled. Since the human is the weak link in this chain, attention must be paid to actions and decisions of that human; users must be aware of the pitfalls and know how to avoid them.
Bulletproof Virus Protection - Protect your network from costly security breaches with Guardian Digital’s multi-faceted security applications. More then just an email firewall, on demand and scheduled scanning detects and disinfects viruses found on the network. Click to find out more!
Take advantage of our Linux Security discussion
list! This mailing list is for general security-related questions and comments.
To subscribe send an e-mail to
Earn an NSA recognized IA Masters Online - The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life.
Security on your mind?
Protect your home and business networks with the free, community version of EnGarde Secure Linux. Don't rely only on a firewall to protect your network, because firewalls can be bypassed. EnGarde Secure Linux is a security-focused Linux distribution made to protect your users and their data.
Guardian Digital Makes Email Safe For Business - Microsoft 365, Goo....
Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headline.
New Paypal phone phish uses voice recording to steal money | ||
9th, July, 2006
The email, which purports to come from PayPal, claims that the recipient's account has been the subject of fraudulent activity. However, unlike normal phishing emails, there is no internet link or response address. Instead, the email urges the recipient to call a phone number and verify their details. |
||
New LinuxSecurity.com Rating System | ||
12th, July, 2006
We are happy to announce our new LinuxSecurity.com Rating System! Now, users have the ability to rate posts in order to provide us with a better idea of what content you would like to see. Start rating posts today and keep a look out for newer features down the road. |
||
Mobile users face knotty security issues | ||
12th, July, 2006
High-profile security breaches may indicate that network executives are using trial and error to sort out the best ways to secure the brave new world of mobile computing. |
||
Scanning USENET for Steganography | ||
10th, July, 2006
After scanning two million images from eBay without finding any hidden messages, we extended the scope of our analysis. A detailed description of the detection framework can be found in Detecting Steganographic Content on the Internet. This page provides details about the analysis of one million images from the Internet Archive's USENET archive. Processing the one million images with stegdetect results in about 20,000 suspicious images. We launched a dictionary attack on the JSteg and JPHide positive images. The dictionary has a size of 1,800,000 words and phrases. The disconcert cluster used to distribute the dictionary attack has a peak performance of roughly 87 GFLOPS. |
||
Hakin9 Magazine | ||
12th, July, 2006
hakin9 is bimonthly magazine about hacking and IT security, covering techniques of breaking into computer systems, defence and protection methods. Our magazine is useful for all those interested in hacking - both professionals (system administrators, security specialists) and hobbyists. |
||
Preventing Internal Security Breaches | ||
14th, July, 2006
Security is always on the minds of system administrators. As Intranets have evolved from glorified online cafeteria menus and corporate memos to robust information portals and mission critical applications, the bar has been raised to protect the castle from critters and other unwanted spooks that go bump in the night. |
||
U.K. ISPs to share data for spam study | ||
11th, July, 2006
A new set of guidelines may pave the way for dozens of Internet service providers in the U.K. to participate in a research project into the problem of spam, estimated to make up 60% or more of the world's e-mail traffic. |
||
Successful Backups Are Not Enough | ||
11th, July, 2006
Data protection requirements have moved on from the purely technical question of "Did the backup work?" to the much more complex question of "Is my business protected?". The view of the backup application of success or failure is no longer relevant unless considered in the context of business policies. |
||
Secure Linux - security kit review | ||
12th, July, 2006
Linux systems are fairly resistant to intrusion attempts. However, for certain applications requiring very high security levels, the features found in standard distributions may prove insufficient. This article examines several of the most popular ways to increase Linux system security at kernel level. |