Security Projects - Page 37

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Security Projects News

Hackers descend on Sydney's GooglePlex for mashup jam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Google Australia plans to incorporate data released by the Government 2.0 Taskforce as part of an 'open access' initiative into its Google Maps platform.Taskforce member and director of engineering at Google Australia Alan Noble told iTnews that the web giant was "going to look at all of the data sets" released by federal and state governments "to see which of those can be used."

Best free Online backup sites

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Do you want to back up your data ? I can help you with that. If you have some important data in your computer like documents, photos, music and videos etc.. you should back up these data regularly to avoid data loss due to hardware failure and system failure.. External storage device is an option to back up your data but you will have to spend some money for that. I can suggest some good free alternatives to that.. even if you have external drive you should back up your data at some online secure site so you can assess your data anywhere.

20 Linux Server Hardening Security Tips

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Securing your Linux server is important to protect your data, intellectual property, and time, from the hands of crackers (hackers). The system administrator is responsible for security Linux box. In this first part of a Linux server security series, I will provide 20 hardening tips for default installation of Linux system.

Six Ways to Botch Your Backups

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Many of us were shocked last week that a company as prominent as Danger, Inc. could make such a rookie mistake by losing the data of T-Mobile's Sidekick customers. As a system administrator, if there is one thing you absolutely have to get right, it's backups. Here are six ways to botch them.

Security Awareness, According to Google Trends

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A wildly unscientific and faintly humorous look at what Google tells us about web searchers' relative (dis)interest in security topics. Google has a nifty tool called Google Trends. It allows you to plug in two or three phrases and see which one is used more often in web searches. Thought I'd check in on current topics and see the degree to which security is fitting into the discussion online.

Certified Ethical Hacker: Not Your Everyday Job

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The term "hacker" doesn't just apply to crooks, thieves and anyone else looking to subvert computer security systems for malevolent purposes. Some hackers are in the business of improving security. Certified Ethical Hackers are paid by companies and government agencies to test their computer systems against the sort of attacks the bad guys often attempt to pull off.

htop & mytop - Interactive Activity Monitors

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

htop and mytop are programs similar to the standard top, but monitor in different ways and different functions. htop is an interactive process viewer for Linux. It is a text-mode application (for console or X terminals) and requires ncurses. Tested with Linux 2.4 and 2.6. Read on for info on mytop, an interactive monitor for MySQL.

Researchers who hack the Mac OS

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Before his coffee was cold he had found a local privilege escalation vulnerability in Mac OS X Tiger, which could allow people to elevate from normal user to full super user, and had written code that could exploit the hole.

Researchers prove kernel is secure

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Australian researchers have demonstrated a way to prove core software for mission-critical systems is safe. The researchers this week said they can prove mathematically that code they have developed, designed to govern the safety and security of systems in aircraft and motor vehicles, is free of many classes of error.