Linux Security Week - March 22nd 2004

    Date21 Mar 2004
    Posted ByAnthony Pell
    This week, perhaps the most interesting articles include "Creating Secure Backups With GnuPG," "Using key-based authentication over SSH," and "Tackling Unix Security in large Organisations." . . . This week, perhaps the most interesting articles include "Creating Secure Backups With GnuPG," "Using key-based authentication over SSH," and "Tackling Unix Security in large Organisations."

    Bulletproof Virus Protection - Protect your network from costly security breaches with Guardian Digital's multi-faceted security applications. More then just an email firewall, on demand and scheduled scanning detects and disinfects viruses found on the network.Click to find out more!

    LINUX ADVISORY WATCH - This week, advisories were released for xitalk, calife, samba, OpenSSL, the Linux kernel, httpd, isakmpd, and Mozilla. The distributors include Debian, EnGarde, FreeBSD, Gentoo, Mandrake, OpenBSD, Red Hat, Slackware, and SuSE.


    LinuxSecurity Feature Extras:

    Security: MySQL and PHP - This is the second installation of a 3 part article on LAMP (Linux Apache MySQL PHP). In order to safeguard a MySQL server to the basic level, one has to abide by the following guidelines.

    Configure Web/DNS/Mail Securely in 5 Minutes with EnGarde - Web, DNS, and Mail are the building block services of the Internet. In this article, I show how to setup a Web, DNS, and Mail server with a few clicks of the mouse using EnGarde Secure Linux.

    Innovative Open Source Approach to Combating Email Threats - Guardian Digital, the world's premier open source security company, has introduced Content and Policy Enforcement (CAPE) technology, an innovative open source software system for securing enterprise email operations.

    [ Linux Advisory Watch ] - [ Linux Security Week ] - [ PacketStorm Archive ] - [ Linux Security Documentation ]

    Take advantage of our Linux Security discussion list! This mailing list is for general security-related questions and comments. To subscribe send an e-mail to This email address is being protected from spambots. You need JavaScript enabled to view it. with "subscribe" as the subject.

    Thank you for reading the weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

    Host Security News:

    March 18th, 2004 -- Detection of SQL Injection and Cross-site Scripting Attacks -- In the last couple of years, attacks against the Web application layer have required increased attention from security professionals. This is because no matter how strong your firewall rulesets are or how diligent your patching mechanism may be, if your Web application developers haven't followed secure coding practices, attackers will walk right into your systems through port 80.

    March 17th, 2004 -- An Advanced File System for Linux -- As you can see, managing permissions through "special interest groups" is terribly inconvenient, and worse, it doesn't scale. A more flexible scheme is Access Control Lists, or ACLs. Instead of capturing permissions in just a few flags, ACLs record permissions in an individual and extensible list of access rights that are attached to each file or directory.

    March 16th, 2004 -- Creating Secure Backups With GnuPG -- GnuPG is a complete and free replacement for PGP. It is a valuable piece of software that is very easy to use and will serve our purpose for covering the topic of secure backups. I won't got into details in installing GnuPG as there are number of good installation guides around that pretty much cover this topic (, and

    March 15th, 2004 -- Security considerations for Web-based mail -- What do field salespeople, home teleworkers, medical personnel and anyone working remotely from a central site have in common? A need for up-to-the-minute information. One of the most successful models for using the Internet for business is the information-dissemination model.

    Network Security News:

    March 19th, 2004 -- Using key-based authentication over SSH -- SSH, or secure shell, is a protocol by which users can remotely log in, administer, or transfer files between computers using an encrypted transport mechanism. Running over every major operating system, SSH provides a more secure connection method than traditional telnet or the much-maligned "r commands" (rlogin, rcp, rsh).

    March 18th, 2004 -- Fixes are in for OpenSSL -- The group behind OpenSSL, a widely used open-source Web security program, released two patches for security flaws to block potential denial-of-service attacks, the organization's developers said on Wednesday.

    General News:

    March 19th, 2004 -- Is Linux Insecure? -- Since I've never encountered Mi2g in any capacity, it's not easy to assess the company's standing as a security consultant. Of course, every security company in the world is a market leader of some kind - the security market seems like a 1,000-way dead heat for first - but Mi2g is at least punching above its weight in terms of media strategy.

    March 19th, 2004 -- Tackling Unix security in large organisations, part 1 -- Managing security in large organizations can be a challenge. Here are some practical tips for keeping your organization sealed tight. In large heterogeneous Unix/Linux environments with several hundred servers, keeping up to date with security patches, which are the number one requirement for strong security, is next to impossible.

    March 19th, 2004 -- Security groups call for crisis coordination center -- Two national task forces organized by the National Cyber Security Partnership called for a public awareness campaign, an early warning contact network and a national crisis coordination center to improve the nation's responses to cyber vulnerabilities, threats and incidents.

    March 17th, 2004 -- Security: getting the facts about cybergeddon -- When everyone in the security world has something to sell, it's harder than ever to get straight answers about genuine threats.

    March 17th, 2004 -- Mitigating the Complexities of Security Management -- Securing your enterprise IT infrastructure can be a complex task. If your computing environment is like most, it is heterogeneous and contains a number of security products from many vendors.

    LinuxSecurity Poll

    What is your favorite feature?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"65","title":"Feature articles","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"66","title":"News","votes":"1","type":"x","order":"2","pct":50,"resources":[]},{"id":"67","title":"HOWTOs","votes":"1","type":"x","order":"3","pct":50,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350


    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.