Security Projects - Page 36

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Security Projects News

Six-monthly releases: OpenBSD shows the way

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Six-monthly releases have become something of a talking point in free and open source software circles after the problems Ubuntu has faced with users unhappy over major bugs. While Ubuntu, which is now five years old, appears to struggle with this pace of development, the OpenBSD project has been doing six-monthly releases for the last 12 years - with no major bugs.

I Was Wrong: There Probably Will Be an Electronic Pearl Harbor

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Ira Winkler prognosticates on the possibility of a catastrophic online international event. Interesting? For 15 years now, I have been publicly lambasting all of those people who have made their careers, or at least made fleeting news headlines, based on their declaration of an imminent Electronic Pearl Harbor. My disdain is based on several factors, but predominantly the lack of accountability for such statements.

Trust Linux!

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A team of researchers has implemented support for 'trusted computing' in a commercially available version of the open source operating system Linux, breaking new ground in the global drive toward more secure computing environments.

A Linux Security Primer

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Linux aficionados and computer security experts -- not to mention many IT writers -- are known to use a couple of terms with, well, not-easily-discernable definitions when they talk about Linux security. Problem is, you need to know these terms to understand discussions about computer security (and, of course, to communicate effectively with security vendors).

Firefox 3.6 locks down component directory

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Mozilla developers have announced that Firefox 3.6 will "lockdown" the components directory of the browser to stop third party applications bypassing the standard add-ons and plug-in support by pushing user invisible changes directly into Firefox. From today's planned release of Firefox 3.6's beta 3, and onwards, the components directory will be for Firefox code only and third party developers will only be able to extend the browser through the officially supported add-ons system.

Hackers descend on Sydney's GooglePlex for mashup jam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Google Australia plans to incorporate data released by the Government 2.0 Taskforce as part of an 'open access' initiative into its Google Maps platform.Taskforce member and director of engineering at Google Australia Alan Noble told iTnews that the web giant was "going to look at all of the data sets" released by federal and state governments "to see which of those can be used."

Best free Online backup sites

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Do you want to back up your data ? I can help you with that. If you have some important data in your computer like documents, photos, music and videos etc.. you should back up these data regularly to avoid data loss due to hardware failure and system failure.. External storage device is an option to back up your data but you will have to spend some money for that. I can suggest some good free alternatives to that.. even if you have external drive you should back up your data at some online secure site so you can assess your data anywhere.

20 Linux Server Hardening Security Tips

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Securing your Linux server is important to protect your data, intellectual property, and time, from the hands of crackers (hackers). The system administrator is responsible for security Linux box. In this first part of a Linux server security series, I will provide 20 hardening tips for default installation of Linux system.

Six Ways to Botch Your Backups

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Many of us were shocked last week that a company as prominent as Danger, Inc. could make such a rookie mistake by losing the data of T-Mobile's Sidekick customers. As a system administrator, if there is one thing you absolutely have to get right, it's backups. Here are six ways to botch them.

Security Awareness, According to Google Trends

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A wildly unscientific and faintly humorous look at what Google tells us about web searchers' relative (dis)interest in security topics. Google has a nifty tool called Google Trends. It allows you to plug in two or three phrases and see which one is used more often in web searches. Thought I'd check in on current topics and see the degree to which security is fitting into the discussion online.

Certified Ethical Hacker: Not Your Everyday Job

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The term "hacker" doesn't just apply to crooks, thieves and anyone else looking to subvert computer security systems for malevolent purposes. Some hackers are in the business of improving security. Certified Ethical Hackers are paid by companies and government agencies to test their computer systems against the sort of attacks the bad guys often attempt to pull off.