Security Projects - Page 52
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Researchers at Cornell Uni. and AT&T labs have created a variant of the C programming language to build more secure apps. Eventually they want to build a secure OS immune to glitches like buffer overflows... "US researchers are working on a . . .
This is the third part of a four-part article devoted to the exploration of LIDS, a Linux kernel patch that will allow users to take away the all-powerful nature of root. The first article in this series offered an overview of . . .
Microsoft and five security companies announced Thursday that they would create an organization to promote the responsible publishing of information about software flaws. Though many of the details have yet to be hammered out, the move marks the beginning of what . . .
Firms are exposing themselves to security risks by failing to implement effective policies, say security experts. A study of 100 British IT directors undertaken by IT services provider GAP indicates that even if firms have drawn up security policies, they were . . .
This is the second part of a four-part series devoted to an overview of LIDS, a Linux kernel patch that will allow users to take away the all-powerful nature of root in order to give programs exactly the access they need . . .
Hundreds of thousands of websites may be at risk after hackers discovered a vulnerability in a popular web server program. Users running PHP Nuke, a free open source tool for database-based websites, were put on red alert yesterday when it was . . .
The word 'Biometry' basically comprises of two words : bio + metry. The word 'bio' refers to life or a living being and the word 'metry' refers to 'measurement'. So 'Biometric' can be summed up as: the science of measurement of physical attributes(unique) to a living being (for authentication /authorization.). . .
The latest issue of Phrack, a premier underground security magazine, has been released. Last issue released in May 2000, the latest issue talks about privacy, ICMP based OS fingerprinting, NIDS on mass parallel processing architecture, and more. "It seems to me . . .
PacketStorm Security named EnGardeLinux.com, the Official Site for the Engarde Secure Linux distribution, "Site of The Week". PacketStorm Security is known as one of the largest and highly regarded security sites on the Internet, offering the latest security exploits, articles and tools. We would like to thank our friends at PacketStorm for the prestigious honor.. . .
Internet activists are planning an international day of protest on Oct. 21 in an effort to jam Echelon, the super-secret global surveillance system. But privacy experts warn the protest is unlikely to succeed. Organizers of the cyber-event are encouraging the Internet . . .
Yeah, go Jay! This news.com article talks with Jay Beale, project lead for the Bastille Linux project. "If there's a stereotype for a hacker, Jay Beale isn't it. Mild-mannered and somewhat shy, Beale--like many hackers of the old school--has made a name for himself at a young age. As the leader of the Bastille Linux Project, an open-source endeavor to make Linux systems more secure by automating the patching process, Beale, 26, is well-known in the Linux community and security circles.. . .
Echelon is the term popularly used for an automated global interception and relay system operated by the intelligence agencies in five nations: the United States, the United Kingdom, Canada, Australia and New Zealand. "A large group of individuals in the Global Internet Community have set out to bring attention to the communications monitoring system known as ECHELON.". . .
The cDc guys have released their 'Hacktivismo FAQ' which discusses this 'special operations' group sponsored by the Cult of the Dead Cow (cDc). They talk about the progress of Peekabooty, the distributed collaborative privacy network, and more. "What is Hacktivismo? . . .
The Bastille Linux development team today announced the release of Bastille Linux 1.2, a hardening script for multiple Linux distributions. With this release, Bastille Linux delivers on the full promise of simplified, automated security administration for Linux systems.. . .
Writes Jeff Field, "With minimal system access allowed and every precaution taken, Engarde Secure Linux just might be the best distribution for Web/mail servers yet." Security is a big issue in Linux. It's always in the forefront, whether users are talking about the latest security updates for the various distributions, or about which OS is more secure.. . .
"The Bastille Linux development team today announced the release of Bastille Linux 1.2, a hardening script for multiple Linux distributions. With this release, Bastille Linux delivers on the full promise of simplified, automated security administration for Linux systems.. . .
A quiet project hosted on SourceForge.net is attempting to give Internet users a level of anonymity that hasn't yet been achieved. Founders of the CryptoBox project are dedicating it to Internet users in censorship-happy countries who face getting prosecuted for sharing . . .
Guardian Digital, the company that brings you LinuxSecurity.com, recently released EnGarde Secure Linux. Engineered from the ground up, EnGarde incorporates intrusion alert abilities, a complete suite of e-business applications using AllCommerce, mail and DNS management for an entire organization, improved authentication and access control, strong cryptography, and complete SSL secure Web-based administration capabilities.. . .
When hackers want to breach your systems, they typically look for well-known security flaws and bugs to exploit. In the past, vendors and hackers gave different names to the same vulnerabilities. One company might package a group of five vulnerabilities into . . .
In 1992, Lance Spitzner joined the U.S. Army with a single goal in mind: to become a tank officer. Ever since childhood, he had loved learning about tanks, and the Army gave him an opportunity to get up-close and personal with . . .