Security Projects - Page 29

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Security Projects News

Why security pros fail (and what to do about it)

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

You've probably heard the phrase, "Failure is the key to success." But are security professionals really learning from their mistakes? As identity theft and online risks keep growing, is our industry rising to the challenge or repeating the miscues of the past? While security technology is improving, the bad guys also have access to better tools. So are the good guys working smarter?

Pirate Bay bloke wants to set up ICANN alternative

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Isn't he in jail now or very shortly? The bloke behind Pirate Bay wants to set up an alternative to the domain name outfit ICANN. Peter Sunde says that he has been suspicious of ICANN for a long time. ICANN is the non-profit corporation is tasked with managing both the IPv4 and IPv6 Internet Protocol address spaces as well as handling the management of top-level domain name space including the operation of root nameservers.

New OpenBSD 4.8 released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Super secure operating system OpenBSD has released a new version. The OpenBSD project is a free multi-platform 4.4BSD-based UNIX-like operating system. It targets those who want a proactive security and integrated cryptography operating system.

Honeyd: The open source honeypot

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Honeyd, the brainchild of Niels Provos, is free open source software released under GNU General Public License. The first major release, 0.5, arrived in 2003, and the latest version I could track down, 1.5c, was released in 2007. Honeyd wasn't the first honeypot, but it quickly became the most accessible and flexible -- the first fully formed honeypot for the masses.

25 internet security tips

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Only The Paranoid Survive is a tract on corporate fundamentals penned by Intel's ex-Chairman Andy Grove. The words should, however, be tattooed on the back of every PC owner's mouse hand.

The Promise Of Open Source

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Linux and open source technologies have started gaining acceptance and momentum with a host of technologies associated with FOSS having reached levels of maturity that are comparable with the best the proprietary software world has to offer. A perceived lower cost of ownership has been pushing enterprises and SMBs to switch to open source-based solutions.

Slideshow: Ten Free Security Monitoring Tools

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Freebie apps can save you money, but deployment may not be so free. Zenoss is an enterprise-class open source server and network monitoring solution that distinguishes itself through its virtualization and cloud monitoring capabilities, which are frequently difficult to find in older free monitoring tools.

How Malware Authors Fight Off Security Researchers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Attackers don't just lay traps for users; they do it for researchers and rivals as well. A recent case in point is an exploit toolkit linked to a Zeus malware campaign that security pros at The Last Line of Defense report includes a fake administration console that records information about anyone who attempts to access or hack it.

Top five urban myths in the IT security sector

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The IT security industry is no stranger to urban myths: stories that spread and, over time, become accepted as general truths. Global IT vendor Panda Security has been asking its community, mainly through Facebook and Twitter, which myths come to mind when talking about antivirus companies, and below we look at the top five answers.

Hacking Damn Vulnerable Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you can't exploit it, you can't secure it. I don't know if that quote has been said before, but if you are deeply interested about computer security or ethical hacking, that should be your main mantra.