Security Projects - Page 38
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Do you want to back up your data ? I can help you with that. If you have some important data in your computer like documents, photos, music and videos etc.. you should back up these data regularly to avoid data loss due to hardware failure and system failure.. External storage device is an option to back up your data but you will have to spend some money for that. I can suggest some good free alternatives to that.. even if you have external drive you should back up your data at some online secure site so you can assess your data anywhere.
Researchers at North Carolina State University and Microsoft Research have come up with a way to combat rootkits by using the machine's own hardware-based memory protection: the so-called HookSafe tool basically protects the operating system kernel from rootkits.
Securing your Linux server is important to protect your data, intellectual property, and time, from the hands of crackers (hackers). The system administrator is responsible for security Linux box. In this first part of a Linux server security series, I will provide 20 hardening tips for default installation of Linux system.
Many of us were shocked last week that a company as prominent as Danger, Inc. could make such a rookie mistake by losing the data of T-Mobile's Sidekick customers. As a system administrator, if there is one thing you absolutely have to get right, it's backups. Here are six ways to botch them.
If you are in a small business or a larger enterprise you know you need to keep track of all those machines. Sure you could easily tag and record them as they go from the box to the desk, but that doesn
A wildly unscientific and faintly humorous look at what Google tells us about web searchers' relative (dis)interest in security topics. Google has a nifty tool called Google Trends. It allows you to plug in two or three phrases and see which one is used more often in web searches. Thought I'd check in on current topics and see the degree to which security is fitting into the discussion online.
Gene may not have taken the best approach to attracting our attention, but what do you think about his ideas on the future of GNU/Linux and security? Okay, I admit I created that title just to get your attention. It worked, you
Wikileaks.org, the online clearinghouse for leaked documents, is working on a plan to make the Web leakier by enabling newspapers, human rights organizations, criminal investigators and others to embed an "upload a disclosure to me via Wikileaks" form onto their Web sites.
The term "hacker" doesn't just apply to crooks, thieves and anyone else looking to subvert computer security systems for malevolent purposes. Some hackers are in the business of improving security. Certified Ethical Hackers are paid by companies and government agencies to test their computer systems against the sort of attacks the bad guys often attempt to pull off.
For IT security practitioners, hearing about defense in depth can conjure up images of clutter. Here to cut through that clutter, point out the shortcomings and offer a better way is CSO columnist Ariel Silverstone.
The quality and security levels of open source code are continuing to improve, according to the latest annual audit by code analysis tools vendor Coverity.
Booming numbers of security researchers are uncovering so many flaws that vendors are finding it almost impossible to patch them all in a reasonable timeframe, the latest SANS report has found.
htop and mytop are programs similar to the standard top, but monitor in different ways and different functions. htop is an interactive process viewer for Linux. It is a text-mode application (for console or X terminals) and requires ncurses. Tested with Linux 2.4 and 2.6. Read on for info on mytop, an interactive monitor for MySQL.
A software engineer who created Trojans for the Swiss authorities to intercept Voice-over-IP (VoIP) phone calls has published the source code to his programs in order to draw attention to the surveillance threat posed by such software.
Before his coffee was cold he had found a local privilege escalation vulnerability in Mac OS X Tiger, which could allow people to elevate from normal user to full super user, and had written code that could exploit the hole.
As we continued to emphasize the security of your WordPress admin panel due to the recent attack on our site, we have compiled a fully detailed article that will highlight some of the must have security measures for your WordPress Admin Area.
Australian researchers have demonstrated a way to prove core software for mission-critical systems is safe. The researchers this week said they can prove mathematically that code they have developed, designed to govern the safety and security of systems in aircraft and motor vehicles, is free of many classes of error.
New versions of the Subversion version management system fix vulnerabilities in the client and server which could allow an attacker to gain control of a system. The cause of the problems are multiple heap overflows in the libsvn_delta library, which may occur when the library is parsing difference data streams (binary deltas).
Developers of open source software projects should be just as concerned about security as anyone developing a proprietary app. However, the nature of the two development processes can be very different at times, and debate still rages about which is inherently more secure -- a secret code kept by a company, or a public one that all eyes can see. Just as important is how each community reacts once a problem is spotted.
Peter Sunde, a co-founder of the Pirate Bay, said Monday that he