Linux Network Security - Page 76

Discover Network Security News

Tokens: An additional level of secure access

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Identification and authentication are two magic words when it comes to security. Letting an authorized user in, while keeping unauthorized people out, sounds easier than it is. If I were to meet you on the street, I'd be able to see . . .

Ten Key Steps to Protection from Denial Of Service Attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

DoS and DDoS (denial-of-service and distributed denial-of-service) attacks, which prevent legitimate users from accessing and using a site or particular service, have become a growing concern as more and more businesses move onto the Internet. Last year, retail giant Amazon.com, electronic . . .

Lion virus: How to detect and prevent

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The dangerous Lion worm is stalking Linux systems. Worse than the Ramen worm, Lion installs then hides hacker tools on vulnerable systems Linux system administrators have a new worm to worry about. The SANS Institute is reporting the . . .

Apache Insecurity Reveals Directory Contents

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this column, we look at buffer overflows in icecast, Half-Life Dedicated Server, Solaris SNMP, ipop2d, ipop3d, and imapd; format string vulnerabilities in icecast, mutt, Half-Life Dedicated Server, and cfengine; temporary-file problems in the SGML-Tools package and Mesa; and problems with . . .

Bulletin: 'Dangerous' Linux worm in the wild

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A dangerous worm is spreading across the Internet and infecting Linux servers running vulnerable domain name software, the SANS Institute warned this morning. Called Lion, the worm steals passwords, installs and hides other hacking tools on infected systems, and then uses . . .

Multi-Homed Server Vulnerabilities

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this column, we look at buffer overflows in ircd, ePerl, MIT Kerberos 4 and 5, ascdc, and slrn; temporary file problems in MIT Kerberos 4 and 5, the GNU C Library, and the Athena widget libraries; other problems with proftpd . . .

Beleaguered researcher says TCP weakness is real

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Two days after a security vendor announced it had found a new vulnerability in TCP, only to be lambasted for passing an old problem off as news, the researcher who identified the weakness defended his work and the decision to announce . . .

Updated backdoor tool gets even nastier

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new version of SubSeven, a powerful and well-known backdoor program that gives attackers almost complete control over a victim's computer, is making the rounds on the Internet. And taking a cue from legitimate software vendors, SubSeven's creator plans to release . . .

IT security: Keep it at home or take it outside?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As the Internet becomes an ever-more dominant medium for doing business, companies require even greater protection for their intellectual assets. Conducting business via the Web turns your network into a proving ground for hackers bent on infamy. Stepping up to meet . . .

Another serious security flaw found in TCP

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For the second time in as many months, researchers have found a serious flaw in one of the key pieces of the Internet's software backbone. Security vendor Guardent on Monday announced it has identified a potentially huge problem in the inner . . .

Deconstructing DoS attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Denial of service (DoS) attacks have made headlines in the last year by assaulting a number of large and very successful companies. A rash of hits roughly a year ago left the e-industry aware of how vulnerable it is. The recent . . .

Study: Domain Name System security still lax

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Companies rushed to upgrade Domain Name System software after warnings were issued in late January about a flaw in widely used DNS software. In the past weeks, however, upgrading has come to a halt, concludes the Iceland DNS consultancy and software . . .

College: A Cracker's Best Friend

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

University and college computer systems have become the virtual destination of choice for crackers in search of easy targets. College and university networks are cracked on a regular basis and are then used as secret servers to share music and video . . .

Gnutella worm: How to deal with it

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Also known as Mandragore, this Gnutella worm is one of the first to infect peer-to-peer network shares When a virus writer succeeds at something new, the virus community calls it a "proof-of-concept" virus or worm. Gnuman (alias W32/GnutellaMan, . . .

Gnutella users warned of Internet worm

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security firms are warning about a proof-of-concept Internet worm which tries to spread malicious files via the Gnutella peer-to-peer file sharing system. The virus, called Gnutella Mandragore, will connect to the Gnutella network once it affects a users PC and will . . .