Linux Security Contributor
Article(s) From This Contributor
Here's a link to an OpenBSD page that describes what crypto features are capable with it. Specifically, as pointed out on slashdot, http://www.openbsd.org/crypto.html#hardware is a link to new support for hardware crypto devices using OpenBSD. We'd be happy to post this kind of information in the future -- just send it along.
Honeynets are one type of honeypot. A honeypot is a resource who's value is in being probed, attacked or compromised. A Honeynet is a high-interaction honeypot, meaning it provides real operating systems for attackers to interact with. This high interaction can teach us a great deal about intruders, everything from how they break into systems to how they communicate and why they attack systems. Honeynets accomplish this by building a network of systems. This network is highly contained, where...
This year's BSDCon is being held at the Monterey Hyatt, in Monterey Ca. The first tutorial was a two-day tutorial covering BSD System Security. For the most part the classes are intensive and there was a lot of ground to cover. . . .
Ninety two percent of survey respondents indicated that their Linux systems have never been infected with a virus, according to Evans Data's new Summer 2004 Linux Development Survey. Further, 78% of Linux developers say that their Linux systems have never been hacked and less than 7% were hacked three or more times. Of the 22% that have been hacked, 23% of the intrusions were by internal users with valid login ID's. . . .
Computer security firm C2Net announced the release of the new open source Stronghold Secure Web server at the European Linux Expo in London, Friday. The product from this US-based company is based on the open source Apache . . .
"Only a handful of computer attackers are actually caught and convicted as federal law enforcement of cyber-crime lags far behind the explosive growth of the Internet, Justice Department records show. In 1998, the private sector reported at least 3,700 hacking . . .
"The hackers who have managed to temporarily paralyse major websites this week used a technique known as "spoofing'', which allows them to commandeer other people's computers to stage massive assaults, US federal investigators said today." . . .
Anne Chen writes ... "Last summer, Linux backers at several companies had some explaining to do after hundreds of DNS servers running Version 5 of Red Hat Inc.'s Red Hat Linux operating system were compromised by hackers launching buffer overflow . . .
"Twenty-one Republican Congress members were so happy to hear Federal Trade Commission (FTC) Chairman Robert Pitofsky say that the regulatory agency would keep its hands off the Internet that they want to hear him say it again." . . .