Security Projects - Page 51

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Security Projects News

Overview of LIDS, Part Four

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This is the fourth and final installation of a four-part series devoted to the exploration of LIDS, a Linux kernel patch that will allow users to take away the all-powerful nature of root. The first article in this series offered an . . .

Secrets of Security Policy Development Revealed!

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Fred shares his professional experience and describes what's required to write a security policy for your organization. "Anyone reading this can draft a corporate security policy, using the secrets I reveal in this column. All you need is a bit of guidance, which I provide herein by discussing where to begin, what components are needed, and what procedures to follow. Due to space limitations, my advice is fairly high level, but it should be enough to get you started.. . .

Secure future all at C

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Researchers at Cornell Uni. and AT&T labs have created a variant of the C programming language to build more secure apps. Eventually they want to build a secure OS immune to glitches like buffer overflows... "US researchers are working on a . . .

Overview of LIDS, Part Three

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This is the third part of a four-part article devoted to the exploration of LIDS, a Linux kernel patch that will allow users to take away the all-powerful nature of root. The first article in this series offered an overview of . . .

Hacker watchdog group in the works

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Microsoft and five security companies announced Thursday that they would create an organization to promote the responsible publishing of information about software flaws. Though many of the details have yet to be hammered out, the move marks the beginning of what . . .

Security policies prove inadequate

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Firms are exposing themselves to security risks by failing to implement effective policies, say security experts. A study of 100 British IT directors undertaken by IT services provider GAP indicates that even if firms have drawn up security policies, they were . . .

Overview of LIDS, Part Two

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This is the second part of a four-part series devoted to an overview of LIDS, a Linux kernel patch that will allow users to take away the all-powerful nature of root in order to give programs exactly the access they need . . .

Open source tool put on red alert

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Hundreds of thousands of websites may be at risk after hackers discovered a vulnerability in a popular web server program. Users running PHP Nuke, a free open source tool for database-based websites, were put on red alert yesterday when it was . . .

Biometrics: Just in a James Bond Flick? Not Anymore!

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The word 'Biometry' basically comprises of two words : bio + metry. The word 'bio' refers to life or a living being and the word 'metry' refers to 'measurement'. So 'Biometric' can be summed up as: the science of measurement of physical attributes(unique) to a living being (for authentication /authorization.). . .

Phrack 57 Available

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The latest issue of Phrack, a premier underground security magazine, has been released. Last issue released in May 2000, the latest issue talks about privacy, ICMP based OS fingerprinting, NIDS on mass parallel processing architecture, and more. "It seems to me . . .

EnGardeLinux.com Named Site of the Week!

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

PacketStorm Security named EnGardeLinux.com, the Official Site for the Engarde Secure Linux distribution, "Site of The Week". PacketStorm Security is known as one of the largest and highly regarded security sites on the Internet, offering the latest security exploits, articles and tools. We would like to thank our friends at PacketStorm for the prestigious honor.. . .

'Jam Echelon Day' protest planned

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Internet activists are planning an international day of protest on Oct. 21 in an effort to jam Echelon, the super-secret global surveillance system. But privacy experts warn the protest is unlikely to succeed. Organizers of the cyber-event are encouraging the Internet . . .

Nailing shut the cyber back door

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Yeah, go Jay! This news.com article talks with Jay Beale, project lead for the Bastille Linux project. "If there's a stereotype for a hacker, Jay Beale isn't it. Mild-mannered and somewhat shy, Beale--like many hackers of the old school--has made a name for himself at a young age. As the leader of the Bastille Linux Project, an open-source endeavor to make Linux systems more secure by automating the patching process, Beale, 26, is well-known in the Linux community and security circles.. . .

The Hacktivismo FAQ v1.0

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The cDc guys have released their 'Hacktivismo FAQ' which discusses this 'special operations' group sponsored by the Cult of the Dead Cow (cDc). They talk about the progress of Peekabooty, the distributed collaborative privacy network, and more. "What is Hacktivismo? . . .

Bastille Linux 1.2 Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Bastille Linux development team today announced the release of Bastille Linux 1.2, a hardening script for multiple Linux distributions. With this release, Bastille Linux delivers on the full promise of simplified, automated security administration for Linux systems.. . .

Newsforge Reviews EnGarde Secure Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Writes Jeff Field, "With minimal system access allowed and every precaution taken, Engarde Secure Linux just might be the best distribution for Web/mail servers yet." Security is a big issue in Linux. It's always in the forefront, whether users are talking about the latest security updates for the various distributions, or about which OS is more secure.. . .

Bastille Linux Release Version 1.2

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"The Bastille Linux development team today announced the release of Bastille Linux 1.2, a hardening script for multiple Linux distributions. With this release, Bastille Linux delivers on the full promise of simplified, automated security administration for Linux systems.. . .