Security Projects - Page 52

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Security Projects News

EnGarde Secure Linux: The Design of the Secure Linux Platform

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Guardian Digital, the company that brings you LinuxSecurity.com, recently released EnGarde Secure Linux. Engineered from the ground up, EnGarde incorporates intrusion alert abilities, a complete suite of e-business applications using AllCommerce, mail and DNS management for an entire organization, improved authentication and access control, strong cryptography, and complete SSL secure Web-based administration capabilities.. . .

Fighting the new electronic war

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In 1992, Lance Spitzner joined the U.S. Army with a single goal in mind: to become a tank officer. Ever since childhood, he had loved learning about tanks, and the Army gave him an opportunity to get up-close and personal with . . .

IBM Dream: Self-Policing Networks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Imagine a world where complicated computer networks need little or no interaction with humans: a world where computers can update and maintain their own systems, shield themselves from misfortune caused by human error and acts of nature, and fiercely protect themselves . . .

PGP Security's NAI Labs Partner With National Security Agency to Develop Secure Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

NAI today announced they are joining with the National Security Agency (NSA) and its other partners to further develop the NSA's Security-Enhanced Linux (SELinux) prototype. The $1.2 million will be paid over the life of the two-year contract, and the work will focus on research and development to improve the security of open-source operating system platforms, the core of Internet infrastructures that have become business critical in today's economy.. . .

Gnutella Targeted for Piracy Control

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Gnutella, on the other hand, is one of several decentralized file-sharing networks that aren't businesses and have no central control. That means there's nobody at these networks for the labels to sue--just the consumers who use them. Security experts say that . . .

Developers call for web security standard

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A group of security developers has called for an industry standard for internet security testing. The group, called Ideahamster, which includes a mixture of security experts and developers, has suggested that the introduction of such a standard would make it easier . . .

Uncovering the secrets of SE Linux: Part 2

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In an uncharacteristic move, the U.S. National Security Agency (NSA) recently released a security-enhanced version of Linux -- code and all -- to the open source community. Part 2 of this developerWorks exclusive delves deeper into the code, dissecting how the . . .

Passive Analysis of SSH (Secure Shell) Traffic

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This advisory demonstrates several weaknesses in implementations of SSH (Secure Shell) protocols. When exploited, they let the attacker obtain sensitive information by passively monitoring encrypted SSH sessions. The information can later be used to speed up brute-force attacks on . . .

Guardian Digital Presents EnGarde Secure Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

EnGarde is the next generation in Linux security providing a complete suite of e-business services, intrusion alert capabilities, improved authentication and access control utilizing strong cryptography, and complete SSL secure Web-based administration capabilities. Imagine a cohesive suite of Open Source applications . . .

Apache 1.3.19 Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Version 1.3.19 of the Apache web server has been released. This version fixes a security bug which could lead to a directory listing being displayed in place of an error message.. . .

In Defense of Copyleft

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Software that is placed under "copyleft" -- as opposed to copyright -- may be in a legal limbo and is still reliant on the concept of copyright, an Irish legal expert says. Stallman said the GPL and copyleft helps guarantee . . .

Openhack III undefeated

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Shortly after 3 a.m. EST last Thursday, eWEEK's third Openhack interactive security test finished its 17-day run with all prizes remaining unclaimed. This is eWEEK Labs' first Openhack test in three tries that hasn't been penetrated successfully, and the credit goes . . .

Security Statement from GTK+ Team

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Below is a statement from Ownen Taylor of the GTK+ development team in regards to the recent GTK_MODULES security issue raised on BUGTRAQ. "In the opinion of the GTK+ team, the only correct way to write a setuid program with a graphical user interface is to have a setuid backend that communicates with the non-setuid graphical user interface via a mechanism such as a pipe and that considers the input it receives to be untrusted.". . .