Featured Linux Articles - Page 23
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
In this interview, Paul Vixie and David Conrad talk about the Internet Software Consortium, the changes in the latest major version of bind, the security features designed into it, and the future of Internet security.
In this interview, Avi Fogel, CEO of Network-1, offers his perspective on the state of Internet security, his experience with Windows and security, and the advantages and disadvantages to Open Source security.
Using apache and OpenSSL you can create your own secure web server to keep authentication and other information private from prying eyes.
"A scanner is a program that automatically detects security weaknesses in a remote or localhost.". Scanners are important to Internet security because they reveal weaknesses in the network.
If a break-in occurs and you want to track the cracker down, the system administrator will first check the log files for evidence of a break-in, so she must be 100% SURE that the log files are valid and haven't been tampered with.
In this feature story we present a very comprehensive guide to setting up a secure log server, by Eric Hines. Mr. Hines goes into very good detail and covers everything from building and configuring syslogd to securing the remote log server.
The US and UK governments want to install a device on public networks to monitor traffic for suspected criminal activities. But is that all they want to do? Chris Parker explains.
In this interview, two principals from Secure Computing, Inc. offer their thoughts on the state of Linux and security, its place in the data center as a secure platform for business, and their work with the National Security Agency to create a Type Enforced version of Linux.
The Linux Trustees Project is an effort to create improved access control and advanced file permission management similar to other operating systems.
Jay Beale talks about his efforts as lead developer of one of the hottest projects in the Internet security space today.
This article by Andrew Kaufman talks about shortsighted thinking that is prevalent in many companies that do not put in place effective security measures.
Have you ever suspected or been notified that your Linux system is under attack? How do you determine whether your system has been compromised? This document is intended to explain how an administrator can implement basic security incident investigation techniques.
An interview with Brian Gemberling, creator of the PullthePlug.com project. Brian invites everyone to find security vulnerabilities on his open systems.
An interview with Marcus Ranum CEO of NFR on Intrusion Detection, Linux, and Security.
Frank van Vliet is the author of AuditFile, many security advisories, and recently pointed out configuration errors on apache.org.
LIDS (Linux Intrusion Detection System) is a Linux kernel patch to enhance the Linux kernel. In this article, we will talk about LIDS, including what it can do and how to use it to build a secure linux system.
ARCServeIT, the Computer Associates Backup Software Solution for Linux, Helps Linux Users Stay on Top of Storage Issues/Disaster Recovery
This week's article is an introduction to cryptography using GNU Privacy Guard.
Benjamin Thomas, an active LinuxSecurity.com contributor, puts together an Intrusion Detection Primer. It is a collection of six research summaries that outline the basics of Intrusion Detection.
Medusa is a kernel patch that improves security by providing a seamless protective layer between system resources and applications, providing access control to system resources.