Cryptography - Page 59.75
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
"BEIJING -- China has eased tough new restrictions on encryption technology, announcing that a vast category of consumer software and equipment -- including mobile phones and Microsoft's Windows operating system -- would be exempt from the rules. " . . .
A Reuters report today said the government agency responsible for enforcing Internet rules has exempted a wide range of consumer software and equipment -- including mobile phones and Microsoft Windows, and added it would not insist on keeping trusteeship of . . .
"An unknown hacker or group of hackers caused havoc in French banking circles late this week after the 96-digit encryption algorithm underlying the Cartes Bancaires system was posted on the Internet. Some sources suggest that the code was posted to . . .
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between hosts on the Internet. Because the tunnel appears to the IP level network code as a normal network device, . . .
This appears to be one hell of a box. "Netscreen Technologies on Monday will introduce the first gigabit security appliance. Called the NetScreen-1000 Gigabit Security System, the product is designed for high-bandwidth, high-capacity e-businesses and enterprises, as well . . .
... "Enabled in these initial builds are SSL, the Security Advisor, and IMAPS. Signed mail and encrypted mail are not yet implemented." [Found on slashdot] . . .
A wave of media-led resentment against the proposed Regulation of Investigatory Powers (RIP) bill, which critics say will give the government the all-clear to monitor private e-mail and mobile phone conversations, has started rising. . . .
OpenSSH is a FREE version of the SSH suite of network connectivity tools that increasing numbers of people on the Internet are coming to rely on. Many users of telnet, rlogin, ftp, and other such programs might not realize that . . .
Alan Docherty of wired writes...LONDON -- Law enforcement officials speaking to the House of Commons said criminals were using the Internet and without new powers those crimes would go undetected by police. Their comments came Monday a home . . .
Here's a good article on installing and using GnuPG, the freely-available and patent-free PGP replacement that can be used to encrypt email and other sensitive information. . . .
How to set up a Linux 2.2 system to use encryption in both disk and network accesses. This document describes how you can use the International Kernel Patch and other packages to make harddisk contents and network traffic inaccessible to . . .
"IBM Wednesday will announce that it has obtained approval from the U.S. government to sell business computers with 256-bit digital key encryption globally. . . .
"While federal investigators continue their hunt for the folks behind the recent denial-of-service attacks that crippled some of the Internet's biggest players, security companies are plying their wares with a vengeance." . . .
This would have been fun to attend! Declan McCullaugh writes ..."Take about 140 cryptographers, fly them to a remote Caribbean island, mix well with beach parties, endless supplies of rum punch, and toss in . . .
Certainly sounds like a step in the right direction. "The United States will let a computer scientist put instructions for writing a powerful computer data-scrambling program on his Web site, but his high-profile lawsuit challenging U.S. export restrictions on . . .
Gateway and eSoft will collaborate to bring business applications to Linux. "eSoft, Inc. (Nasdaq: ESFT), the developer of the TEAM Internet Linux software suite, announced a strategic alliance Wednesday with Gateway, Inc. (NYSE: GTW) to advance Linux-based Internet software and . . .
Red Hat has released an enterprise version of Linux that is developed to work with specific server applications, such as Oracle 8i, Computer Associates products, and SAP R/3. "The Red Hat Linux Enterprise Edition product line is a collaborative effort . . .
This SecurityPortal article discusses digital signatures, including the problems associated with them, and their adoption in businesses. . . .
One small step backwards in electronic freedom. Thomas C. Greene writes..."FBI Director Louis Freeh remains determined to require cryptography users to register their keys so that the Bureau can crack their secret files whenever a judge can be persuaded . . .
Here's info on a new 3Com ethernet card that has encryption built-in. Does Linux support this card and the encryption features on it? It includes IPSec and 3DES encryption support. Email us at This email address is being protected from spambots. You need JavaScript enabled to view it. and we'll post the . . .
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.