Security Projects - Page 30
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Isn't he in jail now or very shortly? The bloke behind Pirate Bay wants to set up an alternative to the domain name outfit ICANN. Peter Sunde says that he has been suspicious of ICANN for a long time. ICANN is the non-profit corporation is tasked with managing both the IPv4 and IPv6 Internet Protocol address spaces as well as handling the management of top-level domain name space including the operation of root nameservers.
Is computer hacking a sport? Should it be rewarded with trophies, awards, and maybe even, jobs? A growing trend points to yes. What used to be a frowned upon and shady underworld of computer hackers is now emerging as a network of professionals that boasts teamwork and helps provide insight into the world of cyber security.
According to a report from the Open Source Observatory and Repository for European public administrations (OSOR), France's social security system, the Caisse Nationale d'Allocations Familiales (CNAF), is now using the open source PostgreSQL database management system (DBMS).
When Microsoft's hot new Kinect motion-sensitive controller was released earlier this month, Phil Torrone and Limor Fried saw an opportunity to subvert what was being presented as a closed system.
Super secure operating system OpenBSD has released a new version. The OpenBSD project is a free multi-platform 4.4BSD-based UNIX-like operating system. It targets those who want a proactive security and integrated cryptography operating system.
A German security enthusiast has used rented computing resources to crack a secure hashing algorithm (SHA-1) password. Thomas Roth used a GPU-based rentable computer resource to run a brute force attack to crack SHA1 hashes.
Honeyd, the brainchild of Niels Provos, is free open source software released under GNU General Public License. The first major release, 0.5, arrived in 2003, and the latest version I could track down, 1.5c, was released in 2007. Honeyd wasn't the first honeypot, but it quickly became the most accessible and flexible -- the first fully formed honeypot for the masses.
Only The Paranoid Survive is a tract on corporate fundamentals penned by Intel's ex-Chairman Andy Grove. The words should, however, be tattooed on the back of every PC owner's mouse hand.
Linux and open source technologies have started gaining acceptance and momentum with a host of technologies associated with FOSS having reached levels of maturity that are comparable with the best the proprietary software world has to offer. A perceived lower cost of ownership has been pushing enterprises and SMBs to switch to open source-based solutions.
Freebie apps can save you money, but deployment may not be so free. Zenoss is an enterprise-class open source server and network monitoring solution that distinguishes itself through its virtualization and cloud monitoring capabilities, which are frequently difficult to find in older free monitoring tools.
Attackers don't just lay traps for users; they do it for researchers and rivals as well. A recent case in point is an exploit toolkit linked to a Zeus malware campaign that security pros at The Last Line of Defense report includes a fake administration console that records information about anyone who attempts to access or hack it.
A computer security researcher says he plans to release code Thursday that could be used to attack some versions of Google's Android phones over the Internet. The attack targets the browser in older, Android 2.1-and-earlier versions of the phones.
The IT security industry is no stranger to urban myths: stories that spread and, over time, become accepted as general truths. Global IT vendor Panda Security has been asking its community, mainly through Facebook and Twitter, which myths come to mind when talking about antivirus companies, and below we look at the top five answers.
The role of CISO has evolved in the last five years from one of IT security administration to high-level risk management. Here are four perspectives on how and why it happened and how you can go about doing the job effectively today.
Putting its money where its mouth is, mobile insecurity company Blackbelt is offering an HTC Desire HD to the hacker that can crack its Mobile Antitheft product or just give it some good feedback.
If you can't exploit it, you can't secure it. I don't know if that quote has been said before, but if you are deeply interested about computer security or ethical hacking, that should be your main mantra.
Is Snort, the 12-year-old open-source intrusion detection and prevention system, dead? The Open Information Security Foundation (OISF), a nonprofit group funded by the U.S. Dept. of Homeland Security (DHS) to come up with next-generation open source IDS/IPS, thinks so.
If a picture's worth 1,000 words, these illustration and diagrams have a lot to say about security. A dozen interesting and illuminating looks at data center security, image spam, forts and castles, and much more from CSO's archives.
Over the last few days, the internet was lit up by reports of a security hole in the Firefox web browser that allowed anyone to hack into Facebook, Twitter, Yelp or Tumblr. A freelance programmer named Eric Butler wrote an extension to Firefox (which anyone can install) that exploits this hole by grabbing free-floating cookies in Wi-Fi networks attached to the above-named sites.
After years of being outside of the mainline, the AppArmor security system is now finally part of the main Linux kernel. Linux founder Linus Torvalds formally released the 2.6.36 kernel this week nearly three months after the release of the 2.6.35 kernel.