Featured Linux Articles - Page 19
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
In this interview we learn how the System Configuration Collector (SCC) project began, how the software works, why Siem chose to make it open source, and information on future developments.
This is the second installation of a 3 part article on LAMP (Linux Apache MySQL PHP). In order to safeguard a MySQL server to the basic level, one has to abide by the following guidelines.
Web, DNS, and Mail are the building block services of the Internet. In this article, I show how to setup a Web, DNS, and Mail server with a few clicks of the mouse using EnGarde Secure Linux.
In this article, a brief introduction of Netwosix is given and the project founder Vincenzo Ciaglia is interviewed. Netwosix is light Linux distribution for system administrators and advanced users.
Award-winning secure operating platform combines ease of management with unsurpassed security as a primary focus.
In this article Duane Dunston gives a brief introduction to Netwox, a combination of over 130 network auditing tools. Also, Duane interviews Laurent Constantin, the creator of Netwox.
This article examines the process of proper Linux security management in 2004. First, a system should be hardened and patched. Next, a security routine should be established to ensure that all new vulnerabilities are addressed. Linux security should be treated as an evolving process.
This article outlines the origins, purpose, and future of the Open Source Vulnerability Database project. Also, we talk to with Tyler Owen, a major contributor.
Guardian Digital, the world's premier open source Internet security company, announced today that its customers were not impacted by the recent kernel security vulnerability that afflicted other open source vendors and their customers.
Guardian Digital, the world's premier open source Internet security company, announced today the availability of Internet Productivity Suite, a comprehensive productivity and security management system. Focused on the increasing requirements of small and medium organizations, this cohesive and highly-secure suite of applications combine to protect users from Internet threats while providing the features necessary to operate a complete Internet presence.
OpenVPN is a newer-generation VPN in that it is based on SSL as the underlying security mechanism. IPSEC is the current and most popular standard for VPN technology.
Guardian Digital, the world's premier open source security company, announced today that they will be reducing the annual subscription cost of the Guardian Digital Secure Network for EnGarde Community users from $229 to $60 for a limited time.
Dan Verton, the author of The Hacker Diaries: Confessions of Teenage Hackers is a former intelligence officer in the U.S. Marine Corps who currently writes for Computerworld and CNN.com, covering national cyber-security issues and critical infrastructure protection.
This paper is written for those paranoid administrators who are looking for a stealthy technique of managing sensitive servers (like your enterprise firewall console or IDS).
This article will discuss a very useful but seemingly overlooked functionality of Netfilter, a firewall code widely used in Linux, that provides content matching and filtering capabilities.
No longer a dark and mysterious process, computer forensics have been significantly on the scene for more than five years now. Despite this, they have only recently gained the notoriety they deserve.
Most of the papers deal with the potential gains a honeypot can give you, and the proper way to monitor a honeypot. Not very many of them deal with the honeypots themselves.
Intrusion Detection is the process and methodology of inspecting data for malicious, inaccurate or anomalous activity. At the most basic levels there are two forms of Intrusion Detection Systems that you will encounter: Host and Network based.
At the RealWorld Linux Expo in Toronto, Guardian Digital launched the next generation of the Community edition of our EnGarde Secure Linux.
Among other benefits, running a honeynet makes one acutely aware about "what is going on" out there. While placing a network IDS outside one's firewall might also provide a similar flood of alerts, a honeypot provides a unique prospective on what will be going on when a related server is compromised used by the intruders.