Cryptography - Page 59.5
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Since Linux has always been Open Source software, freely available on the Internet to all comers, the encryption software necessary to its security has been both a blessing and a curse. At its best, encryption software protects the OS from . . .
For all its promise, Internet commerce is also fostering a boom in the number of criminals using false identification to perpetrate a smorgasbord of crimes, according to a report released Thursday by the National Fraud Center. "The Internet takes . . .
Here is an interesting story..."On Monday, Risca was awarded a $100,000 scholarship for taking first place in the Intel Science Talent Search for her project called "DNA-Based Steganography," which combined the disciplines of cryptography, steganography, and molecular computing. . . .
This month Bruce Schneier talks about Kerberos and Windows 2000, Software as a Burglary Tool, news on the DES replacement, a Business Week interview, and comments from readers. This newsletter is always worth reading. . . .
"Certificates and public key cryptography are emerging as the preferred enablers of strong security. Many large organisations will deploy public key cryptography and certificates throughout the company in the next few years." . . .
"BEIJING -- China has eased tough new restrictions on encryption technology, announcing that a vast category of consumer software and equipment -- including mobile phones and Microsoft's Windows operating system -- would be exempt from the rules. " . . .
A Reuters report today said the government agency responsible for enforcing Internet rules has exempted a wide range of consumer software and equipment -- including mobile phones and Microsoft Windows, and added it would not insist on keeping trusteeship of . . .
"An unknown hacker or group of hackers caused havoc in French banking circles late this week after the 96-digit encryption algorithm underlying the Cartes Bancaires system was posted on the Internet. Some sources suggest that the code was posted to . . .
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between hosts on the Internet. Because the tunnel appears to the IP level network code as a normal network device, . . .
This appears to be one hell of a box. "Netscreen Technologies on Monday will introduce the first gigabit security appliance. Called the NetScreen-1000 Gigabit Security System, the product is designed for high-bandwidth, high-capacity e-businesses and enterprises, as well . . .
... "Enabled in these initial builds are SSL, the Security Advisor, and IMAPS. Signed mail and encrypted mail are not yet implemented." [Found on slashdot] . . .
A wave of media-led resentment against the proposed Regulation of Investigatory Powers (RIP) bill, which critics say will give the government the all-clear to monitor private e-mail and mobile phone conversations, has started rising. . . .
OpenSSH is a FREE version of the SSH suite of network connectivity tools that increasing numbers of people on the Internet are coming to rely on. Many users of telnet, rlogin, ftp, and other such programs might not realize that . . .
Alan Docherty of wired writes...LONDON -- Law enforcement officials speaking to the House of Commons said criminals were using the Internet and without new powers those crimes would go undetected by police. Their comments came Monday a home . . .
Here's a good article on installing and using GnuPG, the freely-available and patent-free PGP replacement that can be used to encrypt email and other sensitive information. . . .
How to set up a Linux 2.2 system to use encryption in both disk and network accesses. This document describes how you can use the International Kernel Patch and other packages to make harddisk contents and network traffic inaccessible to . . .
"IBM Wednesday will announce that it has obtained approval from the U.S. government to sell business computers with 256-bit digital key encryption globally. . . .
"While federal investigators continue their hunt for the folks behind the recent denial-of-service attacks that crippled some of the Internet's biggest players, security companies are plying their wares with a vengeance." . . .
This would have been fun to attend! Declan McCullaugh writes ..."Take about 140 cryptographers, fly them to a remote Caribbean island, mix well with beach parties, endless supplies of rum punch, and toss in . . .
Certainly sounds like a step in the right direction. "The United States will let a computer scientist put instructions for writing a powerful computer data-scrambling program on his Web site, but his high-profile lawsuit challenging U.S. export restrictions on . . .
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.