Cryptography - Page 60
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
... "Enabled in these initial builds are SSL, the Security Advisor, and IMAPS. Signed mail and encrypted mail are not yet implemented." [Found on slashdot] . . .
A wave of media-led resentment against the proposed Regulation of Investigatory Powers (RIP) bill, which critics say will give the government the all-clear to monitor private e-mail and mobile phone conversations, has started rising. . . .
OpenSSH is a FREE version of the SSH suite of network connectivity tools that increasing numbers of people on the Internet are coming to rely on. Many users of telnet, rlogin, ftp, and other such programs might not realize that . . .
Alan Docherty of wired writes...LONDON -- Law enforcement officials speaking to the House of Commons said criminals were using the Internet and without new powers those crimes would go undetected by police. Their comments came Monday a home . . .
Here's a good article on installing and using GnuPG, the freely-available and patent-free PGP replacement that can be used to encrypt email and other sensitive information. . . .
How to set up a Linux 2.2 system to use encryption in both disk and network accesses. This document describes how you can use the International Kernel Patch and other packages to make harddisk contents and network traffic inaccessible to . . .
"IBM Wednesday will announce that it has obtained approval from the U.S. government to sell business computers with 256-bit digital key encryption globally. . . .
"While federal investigators continue their hunt for the folks behind the recent denial-of-service attacks that crippled some of the Internet's biggest players, security companies are plying their wares with a vengeance." . . .
This would have been fun to attend! Declan McCullaugh writes ..."Take about 140 cryptographers, fly them to a remote Caribbean island, mix well with beach parties, endless supplies of rum punch, and toss in . . .
Certainly sounds like a step in the right direction. "The United States will let a computer scientist put instructions for writing a powerful computer data-scrambling program on his Web site, but his high-profile lawsuit challenging U.S. export restrictions on . . .
Gateway and eSoft will collaborate to bring business applications to Linux. "eSoft, Inc. (Nasdaq: ESFT), the developer of the TEAM Internet Linux software suite, announced a strategic alliance Wednesday with Gateway, Inc. (NYSE: GTW) to advance Linux-based Internet software and . . .
Red Hat has released an enterprise version of Linux that is developed to work with specific server applications, such as Oracle 8i, Computer Associates products, and SAP R/3. "The Red Hat Linux Enterprise Edition product line is a collaborative effort . . .
This SecurityPortal article discusses digital signatures, including the problems associated with them, and their adoption in businesses. . . .
One small step backwards in electronic freedom. Thomas C. Greene writes..."FBI Director Louis Freeh remains determined to require cryptography users to register their keys so that the Bureau can crack their secret files whenever a judge can be persuaded . . .
Here's info on a new 3Com ethernet card that has encryption built-in. Does Linux support this card and the encryption features on it? It includes IPSec and 3DES encryption support. Email us at This email address is being protected from spambots. You need JavaScript enabled to view it. and we'll post the . . .
This is a very interesting article about the future of cryptography. David Lammers writes ... "At the Intel Developer Forum, Intel unveiled a copy protection scheme that will add a layer of encryption between the system and . . .
As we know, mobile security is a big problem. Rupert Collins-White writes..."Wireless devices will soon be able to reference digital certificates held on servers, boosting security for mobile e-commerce applications, thanks to version 1.3 of the Wireless Application Protocol . . .
Protecting access to Defense Department information systems with public-key infrastructure software tokens presents an "enormous problem'" because of the scale of the effort involved in issuing digital certificates to a uniformed and civilian work force that totals more than a . . .
This E-Commerce Times article writes, "The U.S. government and many states are now passing Uniform Electronic Transaction Act (UETA) laws that recognize the legal validity of electronic signatures and transactions." . . .
The Cleo Products Group have announced they have added "support for the open-source platform to its Cleo 3780Plus product. Cleo 3780Plus, which will now work with Linux, UNIX and Windows, allows B2B e-commerce operations to exchange such data as . . .
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.