Featured Linux Articles - Page 22
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
Sending sensitive data through email has become a frequent practice among online workers. However, not all sources you send can be trusted entirely, as someone could be hacked or want to use your information for malicious intent. GnuPG, an easy-to-use encryption service, can help you ensure data and network security so only those who need access can see the information being sent.
EnGarde Secure Linux, the next generation in Linux security, is now available for immediate download.
In this feature story, F. William Lynch outlines how to install and configure Tripwire, Open Source Linux Edition. Tripwire is a very effective host intrustion detection system.
EnGarde is the next generation in Linux security providing a complete suite of e-business services, intrusion alert capabilities, improved authentication and access control utilizing strong cryptography, and complete SSL secure Web-based administration capabilities.
This document outlines the kernel security improvements that have been made in the 2.4 kernel. A number of significant improvements including cryptography and access control make 2.4 a serious contender for secure corporate environments as well as private virtual networking.
In yet another set of advancements to the kernel IP packet filtering code, netfilter allows users to set up, maintain, and inspect the packet filtering rules in the new 2.4 kernel. This document explains those changes and tips on how to get started.
This article outlines the importance of monitoring vendor advisories and applying appropriate software patches when necessary. It uses the Ramen epidemic as an example showing the possible effects of poor system administration.
This document is a review of the Arkeia backup software combined with theEcrix rakpak dual 66G drive, discussion of the features, security, usage, documentation, and support.
David Dittrich, coordinator for the Forensic Challenge, outlines a contest that pits the best efforts by the blackhat community against anyone in the security community who wishes to accept it.
Daniel Swan's tireless efforts come to fruition after many months of development of the comp.os.linux.security FAQ. LinuxSecurity.com speaks with Daniel about his FAQ and Linux security.
In this interview Vincent Rijmen talks about the development of the Rijndael algorithm, his selection as the NIST algorithm of choice for AES, thoughts on Linux and security, and the future of Internet security.
In this interview, Paul Vixie and David Conrad talk about the Internet Software Consortium, the changes in the latest major version of bind, the security features designed into it, and the future of Internet security.
In this interview, Avi Fogel, CEO of Network-1, offers his perspective on the state of Internet security, his experience with Windows and security, and the advantages and disadvantages to Open Source security.
Using apache and OpenSSL you can create your own secure web server to keep authentication and other information private from prying eyes.
"A scanner is a program that automatically detects security weaknesses in a remote or localhost.". Scanners are important to Internet security because they reveal weaknesses in the network.
If a break-in occurs and you want to track the cracker down, the system administrator will first check the log files for evidence of a break-in, so she must be 100% SURE that the log files are valid and haven't been tampered with.
In this feature story we present a very comprehensive guide to setting up a secure log server, by Eric Hines. Mr. Hines goes into very good detail and covers everything from building and configuring syslogd to securing the remote log server.
The US and UK governments want to install a device on public networks to monitor traffic for suspected criminal activities. But is that all they want to do? Chris Parker explains.
In this interview, two principals from Secure Computing, Inc. offer their thoughts on the state of Linux and security, its place in the data center as a secure platform for business, and their work with the National Security Agency to create a Type Enforced version of Linux.
The Linux Trustees Project is an effort to create improved access control and advanced file permission management similar to other operating systems.