Server Security - Page 44
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
The microcomputer revolution empowered script kiddies and other, more inquisitive, barbarians to begin an onslaught against IT. With the advent of wireless computing and distributed operating systems, the dangers continue to evolve and to multiply. Often computer security takes us down . . .
A small number of users upgrading their Domain Name System (DNS) servers to guard against a major exploit in BIND have become entangled in a denial of service issue. The problem in updating from BIND (Berkeley Internet Name Domain) 4.9.x or . . .
In an uncharacteristic move, the U.S. National Security Agency recently released a security-enhanced version of Linux -- code and all -- to the open source community. This dW-exclusive article takes a first look at this unexpected development -- what it means . . .
Security experts recently made an unprecedented appeal to computer system administrators to update software to protect the Internet. The warning highlights the vulnerabilities of the digital era. Security flaws continue to be the Achilles Heel of the information revolution. There is . . .
That's sort of what I was feeling when I saw that the National Security Agency was releasing a secured version of Linux 2.2 into the "open source" community, along with the background on the testing models it used for verification. It . . .
Sun Microsystems has revealed a security hole in several versions of a critical component of Java that could allow an attacker to run harmful programs on a victim's computer. The vulnerability appears in versions of the Java Runtime Environment that Sun . . .
This post by D. J. Bernstein, author of djbdns, a "secure" DNS server, wrote this message prompted by the recent problems experienced with BIND 9 and its "300000 lines of bad code." "BIND 9 is good code, you say? The BIND programmers learned their lesson from these security disasters and rewrote everything from scratch? Professor Bernstein's opinion differs. . .
These servers run the Squid proxy server software; this software is available under the GNU general public license. In brief, Squid provides for caching and/or forwarding requests for internet objects such as the data available via HTTP, FTP and gopher protocols. . . .
A year later, many security companies have had the chance to examine Win2K in detail. And hackers have had their shots at cracking it. So how have Redmond's promises of improved security stood up after this gimlet-eyed scrutiny? Surprisingly well. While . . .
Last week, I mentioned that the new beta version of Proxomitron, a local Web proxy, supports SSL. Let's look at how this works. Normally, Proxomitron works only with unencrypted traffic. It listens (by default) on port 8080. To relay traffic through . . .
... IT managers and CxOs already understand the value of strong security practices, right? Wrong. Apparently, the message isn't hitting home. Even with the constant barrage of security talk spewed by media and marketers, IT managers can't get upper management to . . .
This article is the first one in a series about the main security holes that can usually to appear within an application. Along these articles, we'll show the ways to avoid them by changing a little the development habits. It doesn't . . .
Let's continue where we left off by taking a closer look at /etc/inetd.conf. Remember that inetd is the internet super-server which listens for requests on behalf of other daemons; it reads /etc/inetd.conf to determine which ports you wish it to listen . . .
Among BIND, there were several other vulnerabilities this week. "Buffer-overflow problems have been found in versions 4 and 8 of BIND, a domain-name-system daemon distributed by the Internet Software Consortium (ISC). This vulnerability has wide implications as most sites on the . . .
Solar Designer has updated his OpenWall patches for BIND 4.9.7 and BIND 4.9.8. COVERT Labs at PGP Security has published a security advisory on a number of BIND vulnerabilities:. . .
There are two things I am sure of after all these years: there is a growing societal need for high assurance software, and market forces are never going to provide it. Superficially, I'm going to offer a few comments on the technology underlying the NSA release. My real intent is to induce the Open Source community into building on this release--so when society wakes up to the fact that this stuff is really, truly needed, something is actually there. . . .
Connecting a computer to the Internet can be dangerous business. Just ask Troy Hall. Three months ago, the experienced system administrator put his newest Linux server online. Three days later, an intruder had taken control of it.
In what some see as a perfect example of the evidence of cosmic retribution, an avalanche of spam has crashed British Internet service provider Pipex's servers, and stopped delivery of e-mail to its million-plus users for the past week. . . .
Problems this week include a problem with glibc, a possible problem with ReiserFS, a buffer overflow in exrecover, a stack overflow in arp, temporary file race conditions in a long list of programs, and a back door in Borland InterBase. . . .
This document discusses implementing process accounting on a BSD system. The paths may be slightly different on a Linux system, but it's otherwise the same. "Over a year ago, I had an interesting job of tracking down how a root superuser . . .