Server Security - Page 50
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
ZDNet writes, "A suspected computer hacker boosted the stock of Aastrom Biosciences Inc. on Thursday by posting a fake press release on the company's Web site announcing a merger with California biopharmaceutical company Geron Corp." . . .
Bastille Linux, a suite of scripts designed to help secure a RH box is now available. Release 1.0.3 is now online, accessible via the site. The Freshmeat post should hit soon as well. This version includes: . . .
John Borland writes ... "In the battle to strengthen Web security, the open-door policies that helped universities create the Net may now prove to be its weakest link. At least two California institutions--Stanford University and the University of California at . . .
Sherman Fridman writes ... "Responding to the recent flurry of incapacitating attacks on various major Web sites such as Yahoo and eBay, Network Associates, Inc., has launched a new business-to-business service called myCIO.com which allows enterprises to click on to . . .
Buy.com, Amazon and EBay are the latest sites to be hit with a distributed denial of service attack. These attacks are coordinated typically between many people and web sites, all sending "junk traffic" to a site at the same . . .
Distributed Denial Of Service attacks are the AK-47 of attackers today. These attack tools "send a crippling barrage of data to the target Web site. The Web server receiving the data requests is duped into responding to them, as . . .
I think most of us probably noticed Yahoo.com being down today. I didn't believe it until I did three seperate traceroutes from three different hosts with Internet backbone connections. Johnathan Dube writes ... "Yahoo! came under attack today and . . .
One of the most difficult decisions in any given enviroment is the distribution of trust. Who can you trust and with how much access? If you have a Systems Administrator on-site then they probably have super user access . . .
Denial of service attacks are a part of life on the Internet. They are generally speaking the easiest attacks to commit since they require minimal skill, only a minimum of knowledge about your intended victim's network, and can be done . . .
Many Linux administrators often think about securing their systems from the top down (or perhaps the outside in). Significant focus is placed on Firewalls, packet filtering, limiting or denying dangerous services and controlling available programs and local permissions. . . .