Security Projects - Page 51
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Yeah, go Jay! This news.com article talks with Jay Beale, project lead for the Bastille Linux project. "If there's a stereotype for a hacker, Jay Beale isn't it. Mild-mannered and somewhat shy, Beale--like many hackers of the old school--has made a name for himself at a young age. As the leader of the Bastille Linux Project, an open-source endeavor to make Linux systems more secure by automating the patching process, Beale, 26, is well-known in the Linux community and security circles.. . .
Echelon is the term popularly used for an automated global interception and relay system operated by the intelligence agencies in five nations: the United States, the United Kingdom, Canada, Australia and New Zealand. "A large group of individuals in the Global Internet Community have set out to bring attention to the communications monitoring system known as ECHELON.". . .
The cDc guys have released their 'Hacktivismo FAQ' which discusses this 'special operations' group sponsored by the Cult of the Dead Cow (cDc). They talk about the progress of Peekabooty, the distributed collaborative privacy network, and more. "What is Hacktivismo? . . .
The Bastille Linux development team today announced the release of Bastille Linux 1.2, a hardening script for multiple Linux distributions. With this release, Bastille Linux delivers on the full promise of simplified, automated security administration for Linux systems.. . .
Writes Jeff Field, "With minimal system access allowed and every precaution taken, Engarde Secure Linux just might be the best distribution for Web/mail servers yet." Security is a big issue in Linux. It's always in the forefront, whether users are talking about the latest security updates for the various distributions, or about which OS is more secure.. . .
"The Bastille Linux development team today announced the release of Bastille Linux 1.2, a hardening script for multiple Linux distributions. With this release, Bastille Linux delivers on the full promise of simplified, automated security administration for Linux systems.. . .
A quiet project hosted on SourceForge.net is attempting to give Internet users a level of anonymity that hasn't yet been achieved. Founders of the CryptoBox project are dedicating it to Internet users in censorship-happy countries who face getting prosecuted for sharing . . .
Guardian Digital, the company that brings you LinuxSecurity.com, recently released EnGarde Secure Linux. Engineered from the ground up, EnGarde incorporates intrusion alert abilities, a complete suite of e-business applications using AllCommerce, mail and DNS management for an entire organization, improved authentication and access control, strong cryptography, and complete SSL secure Web-based administration capabilities.. . .
When hackers want to breach your systems, they typically look for well-known security flaws and bugs to exploit. In the past, vendors and hackers gave different names to the same vulnerabilities. One company might package a group of five vulnerabilities into . . .
In 1992, Lance Spitzner joined the U.S. Army with a single goal in mind: to become a tank officer. Ever since childhood, he had loved learning about tanks, and the Army gave him an opportunity to get up-close and personal with . . .
Imagine a world where complicated computer networks need little or no interaction with humans: a world where computers can update and maintain their own systems, shield themselves from misfortune caused by human error and acts of nature, and fiercely protect themselves . . .
NAI today announced they are joining with the National Security Agency (NSA) and its other partners to further develop the NSA's Security-Enhanced Linux (SELinux) prototype. The $1.2 million will be paid over the life of the two-year contract, and the work will focus on research and development to improve the security of open-source operating system platforms, the core of Internet infrastructures that have become business critical in today's economy.. . .
Gnutella, on the other hand, is one of several decentralized file-sharing networks that aren't businesses and have no central control. That means there's nobody at these networks for the labels to sue--just the consumers who use them. Security experts say that . . .
Rule Set Based Access Control (RSBAC) version 1.1.1 has been released. Information and downloads are available from https://www.rsbac.org/. . .
Natalie Whitlock talks about the incongruence of closed security systems, and the open source solution. She discusses Eric Raymond's ideas, the famous "back door" in Microsoft's FrontPage, the concept of peer review, and the open source dilemma that no one is . . .
The best way to keep a hacker from breaking into a computer system from the outside may just be to have a hacker on the inside. That's what John Brozycki and Darien Ford's company figured when it paid $7,000 so they . . .
A group of security developers has called for an industry standard for internet security testing. The group, called Ideahamster, which includes a mixture of security experts and developers, has suggested that the introduction of such a standard would make it easier . . .
In an uncharacteristic move, the U.S. National Security Agency (NSA) recently released a security-enhanced version of Linux -- code and all -- to the open source community. Part 2 of this developerWorks exclusive delves deeper into the code, dissecting how the . . .
Today Dave Dittrich of the Honeynet Project announced the results of the "Honeynet Fornesic Challenge". The results of all submitted reports are available on the page. Dave also talks about how the Honeynet Project is going to continue using . . .
This advisory demonstrates several weaknesses in implementations of SSH (Secure Shell) protocols. When exploited, they let the attacker obtain sensitive information by passively monitoring encrypted SSH sessions. The information can later be used to speed up brute-force attacks on . . .