Server Security - Page 28
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Users of the open-source mail package should now be able to reduce their spam levels. Sendmail on Monday released the first implementation of a mail filter that uses Sender ID, an anti-spam technology currently being considered by the Internet Engineering Task Force (IETF). . . .
The spam flood is rising, contributing to a reduction in the usefulness of e-mail, a market research firm said Wednesday. Unsolicited e-mail from con artists, virus writers and advertisers accounts for 38 percent of the 31 billion e-mails sent each day in North America this year, up from 24 percent in 2002, . . .
The Massachusetts Institute of Technology (MIT) has warned of security vulnerabilities in its implementation of Kerberos that could allow attackers free access to protected systems. Users of MIT Kerberos 5 are urged to apply patches immediately. . . .
In a caper eerily similar to the the theft of $200,000 worth of AT&T Broadband equipment in 2000, high-tech thieves raided 26 outdoor amplifier sites in Cooper City, causing as many as 14,000 Comcast customers to lose cable service for up to two hours. . . .
Similar to packet sniffing, port scanning and other "security tools", vulnerability scanning can help you to secure your own network or it can be used by the bad guys to identify weaknesses in your system to mount an attack against. The idea is for you to use these tools to identify and fix these weaknesses before the bad guys use them against you. . . .
As more traffic across the Internet is coming under scrutiny and network administrators are making efforts to limit the traffic in and out of their networks, the one port that no one is willing to block en-masse is port 80. Users (and administrators) browse the web constantly, whether it is for work purposes or not. The lifeblood of a company's existence on the Internet requires a web presence in one fashion or another and this requires a web server, whether it is hosted by a service provider or located on a company's network. . . .
Linux developers said they had few problems with attacks and viruses overall, with 92 percent saying their Linux systems have never been infected with a virus, and 78 percent saying their systems have never been hacked. Less than seven percent claimed to have been hacked three or more times. . . .
Security is becoming one of the most urgent challenges in database research and industry, and there has also been increasing interest in the problem of building accurate data mining models over aggregate data, while protecting privacy at the level of individual records. Instead of building walls around servers or hard drives, a protective layer of encryption is provided around specific sensitive data-items or objects. . . .
This guest editorial by Victor Yodaiken looks at several operating system (OS) certifications that have recently been used as ammunition against Linux by real-time OS vendors targeting the high-security and military markets. It also debunks several emotional and inflamatory arguments impugning Linux security. . . .
One of the issues HKAOA considered when developing the new system was security. "Because we were putting sensitive information about our members online, security had to be absolutely bullet-proof. Linux was clearly the best choice from a security perspective," said Findlay. . . .
This guest editorial by Victor Yodaiken looks at several operating system (OS) certifications that have recently been used as ammunition against Linux by real-time OS vendors targeting the high-security and military markets. It also debunks several emotional and inflamatory arguments impugning Linux security. . . .
Gentoo has fixed a vulnerability in the 2.6 Linux kernel that could be exploited for a remote denial-of-service attack. The company calls this a "high-impact" flaw and recommends users update to newer versions of the kernel. . . .
A FTP server does the heavy lifting of security, organization, and transfer control, while clients usually just take part in saving transferred files to a specified location on your hard drive. If you are really into business and plan on spending money on your FTP server, you'll want to focus on what kind of qualities and characteristics the software provides. . . .
Linux and Unix vendors are releasing fixes for a critical bug in the popular Web server Apache that could allow attackers to crash the system or execute malicious code. The bug affects Apache 1.3.x installations configured to act as proxy servers, which relay requests between a Web browser and the Internet. When a vulnerable server connects to a malicious site, a specially crafted packet can be used to exploit the vulnerability, according to security researcher Georgi Guninski, who has publicly released exploit code. . . .
We've been trying to educate programmers about writing secure code for at least a decade and it flat-out hasn't worked. While I'm the first to agree that beating one's head against the wall shows dedication, I am starting to wonder if we've chosen the wrong wall. What's Plan B? . . .
A newly discovered security hole in Linux, published on an open source website, has raised questions about how Linux security issues should be handled. The vulnerability could allow malicious users to bring down Linux machines with just 24 lines of code, which are available from several open source websites and internet news groups. . . .
A flaw in the Linux kernel allows a 20-line C program to crash most distributions using the 2.4 and 2.6 kernels running on x86 and x86-64 architectures, according to security researchers. The problem means that anyone with an ordinary user account on a Linux machine can crash the entire server, according to Oyvind Saether, who discovered the bug along with Stian Skjelstad. Administrator access isn't required. . . .
"The program works on any normal user account, and root access is not required," Sæther reported. "This exploit has been reported used to take down several 'lame free-shell providers' servers. [Running code you know will damage a system intentionally and hacking in general] is illegal in most parts of the world and strongly discouraged." . . .
A bug lets a simple C program crash the kernel, effectively locking the whole system. It affects both 2.4.2x and 2.6.x kernels on the x86 architecture, and does not require root access. . . .
Red Hat Inc. released a spate of security advisories Wednesday, warning users of three separate buffer overflow flaws in Red Hat Enterprise Linux. The Linux distributor urged users to apply the latest patches available from Red Hat Network. . . .