Security Projects - Page 46
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Yes, it's true, it's finally here! We're proud to announce the release of the new stable branch of snort, 2.1, and the first release, 2.1.0. This release can be found at the usual place, / . . .
As you know, savannah.gnu.org and savannah.nongnu.org have been down for a number of weeks due to a system crack. Thanks to the contributions of many people -- most notably Mathieu Roy, Jim Blair, and Paul Fisher -- the system is working again for existing projects.. . .
For those few who don't know yet, Openwall GNU/*/Linux (or Owl) is a security-enhanced operating system with Linux and GNU software as its core, intended as a server platform.. . .
A handful of recent on-line attacks on free and open-source software servers has open-source developers looking over their shoulders. During the past four months, unknown intruders have breached the security around servers hosting programs and code published by the Linux kernel . . .
The Information Security Forum (ISF) has released its latest international industry benchmark, the Standard of Good Practice for Information Security. The Standard is designed to help any organisation - irrespective of market sector, size or structure - to keep the risks . . .
Five working groups formed at the National Cyber Security Summit released initial reports that focus on delivering concrete results within a year, task force leaders said Thursday.. . .
On December 1st, 2003, we discovered that the "Savannah" system, which is maintained by the Free Software Foundation and provides CVS and development services to the GNU project and other Free Software projects, was compromised at circa November 2nd, 2003.. . .
University campuses and corporate boardrooms aren't the only places that benefit from diversity -- computer networks and the Internet could stand up better to viruses and worms if they relied on more diverse software, according to computer scientists at Carnegie Mellon . . .
The vulnerabilities, disclosed to the BugTraq security mailing list over the weekend, allow rogue Web sites to take control of a victim's computer by exploiting weaknesses in the way the browser handles "skin" files, or configuration files that can change the . . .
Michael S. Mimoso submits, Linux distributor Debian reported Friday afternoon that some of its servers have been compromised since Thursday. The alert, posted to several security and Linux mailing lists, stresses that its archive had not been hacked, sparing thousands of installations a potential security nightmare.. . .
A prominent security researcher this week proposed a plan to create a trade association for vulnerability researchers that would act as an advocacy organization as well as protect the legal and economic interests of the members. The plan is still very . . .
We are pleased to announce the official release of OpenBSD 3.4. This is our 14th release on CD-ROM (and 15th via FTP). We remain proud of OpenBSD's record of seven years with only a single remote hole in the default install. As in our previous releases, 3.4 provides significant improvements, including new features, in nearly all areas of the system.. . .
CanSecWest would like to announce the final selection of papers for the first, fall, PacSec.jp/core03 conference (below), and the beginning of the call to submit papers for the spring, fifth annual, CanSecWest/core04 network security training conference. . . .
Michael Rash submits fwsnort translates snort rules into an equivalent iptables ruleset. By making use of the iptables string match module, fwsnort can detect application layer signatures which exist in many snort rules. fwsnort adds a --hex-string option to . . .
There are two parts to any security policy. One deals with preventing external threats to maintain the integrity of the network. The second deals with reducing internal risks by defining appropriate use of network resources.. . .
The vast majority of worms and other successful cyber attacks are made possible by vulnerabilities in a small number of common operating system services. Attackers are opportunistic. They take the easiest and most convenient route and exploit the best-known flaws with . . .
Still, on the whole, no cost up-front is hard to beat. The software giants already concede their products have no advantages over open source products in terms of security and reliability. They hope to maintain sales based on superior service and customer service, but then again, none of the companies mentioned have a reputation for much other than arrogance when it comes to dealing with customers.. . .
Shawn Hawkins submits A new Linux security distro has been released. PHLAK, short for Professional Hacker's Linux Assault Kit, is a direct fork of Morphix. Phlak is a modular LiveCD Linux distribution with a focus on pen-testing, . . .
Researchers on three University of Nebraska campuses are working to complete a proposal that could make NU the first Department of Homeland Security Center of Excellence.. . .
quicktables is an iptables firewall/NAT (gateway) script generator. It was created to quickly provide a secure set of iptables rules. It will ask you to answer a small handful of questions, and generates your very own personalized firewall script. . . .
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.