Security Projects - Page 36
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Six-monthly releases have become something of a talking point in free and open source software circles after the problems Ubuntu has faced with users unhappy over major bugs. While Ubuntu, which is now five years old, appears to struggle with this pace of development, the OpenBSD project has been doing six-monthly releases for the last 12 years - with no major bugs.
Ira Winkler prognosticates on the possibility of a catastrophic online international event. Interesting? For 15 years now, I have been publicly lambasting all of those people who have made their careers, or at least made fleeting news headlines, based on their declaration of an imminent Electronic Pearl Harbor. My disdain is based on several factors, but predominantly the lack of accountability for such statements.
This is the second of two parts of an interview of Stephen Northcutt by technologist David Greer. Everything that follows is by Messrs Greer and Northcutt with minor edits. DG: It seems like many of the current security issues are problems that we have been dealing with for decades. How do you see the evolution of the problem space of information security?
Fresh ISO images of Owl-current for x86 and x86-64 (generated today) are available on our FTP mirrors (well, maybe not on all yet, but should be by tomorrow). There are also direct download links on the Owl homepage (pointing to a specific already-updated and fast mirror)
A team of researchers has implemented support for 'trusted computing' in a commercially available version of the open source operating system Linux, breaking new ground in the global drive toward more secure computing environments.
Linux aficionados and computer security experts -- not to mention many IT writers -- are known to use a couple of terms with, well, not-easily-discernable definitions when they talk about Linux security. Problem is, you need to know these terms to understand discussions about computer security (and, of course, to communicate effectively with security vendors).
The Mozilla developers have announced that Firefox 3.6 will "lockdown" the components directory of the browser to stop third party applications bypassing the standard add-ons and plug-in support by pushing user invisible changes directly into Firefox. From today's planned release of Firefox 3.6's beta 3, and onwards, the components directory will be for Firefox code only and third party developers will only be able to extend the browser through the officially supported add-ons system.
With a focus on risks, rather than only ranking software vulnerabilities, the Open Web Application Security Project (OWASP) has made a significant - and welcomed - change in how the organization rates Web application security weaknesses.
Open source companies worth watching focus on cloud computing, security, collaboration and more.
Google Australia plans to incorporate data released by the Government 2.0 Taskforce as part of an 'open access' initiative into its Google Maps platform.Taskforce member and director of engineering at Google Australia Alan Noble told iTnews that the web giant was "going to look at all of the data sets" released by federal and state governments "to see which of those can be used."
Do you want to back up your data ? I can help you with that. If you have some important data in your computer like documents, photos, music and videos etc.. you should back up these data regularly to avoid data loss due to hardware failure and system failure.. External storage device is an option to back up your data but you will have to spend some money for that. I can suggest some good free alternatives to that.. even if you have external drive you should back up your data at some online secure site so you can assess your data anywhere.
Researchers at North Carolina State University and Microsoft Research have come up with a way to combat rootkits by using the machine's own hardware-based memory protection: the so-called HookSafe tool basically protects the operating system kernel from rootkits.
Securing your Linux server is important to protect your data, intellectual property, and time, from the hands of crackers (hackers). The system administrator is responsible for security Linux box. In this first part of a Linux server security series, I will provide 20 hardening tips for default installation of Linux system.
Many of us were shocked last week that a company as prominent as Danger, Inc. could make such a rookie mistake by losing the data of T-Mobile's Sidekick customers. As a system administrator, if there is one thing you absolutely have to get right, it's backups. Here are six ways to botch them.
If you are in a small business or a larger enterprise you know you need to keep track of all those machines. Sure you could easily tag and record them as they go from the box to the desk, but that doesn
A wildly unscientific and faintly humorous look at what Google tells us about web searchers' relative (dis)interest in security topics. Google has a nifty tool called Google Trends. It allows you to plug in two or three phrases and see which one is used more often in web searches. Thought I'd check in on current topics and see the degree to which security is fitting into the discussion online.
Gene may not have taken the best approach to attracting our attention, but what do you think about his ideas on the future of GNU/Linux and security? Okay, I admit I created that title just to get your attention. It worked, you
Wikileaks.org, the online clearinghouse for leaked documents, is working on a plan to make the Web leakier by enabling newspapers, human rights organizations, criminal investigators and others to embed an "upload a disclosure to me via Wikileaks" form onto their Web sites.
The term "hacker" doesn't just apply to crooks, thieves and anyone else looking to subvert computer security systems for malevolent purposes. Some hackers are in the business of improving security. Certified Ethical Hackers are paid by companies and government agencies to test their computer systems against the sort of attacks the bad guys often attempt to pull off.
For IT security practitioners, hearing about defense in depth can conjure up images of clutter. Here to cut through that clutter, point out the shortcomings and offer a better way is CSO columnist Ariel Silverstone.