Security Projects - Page 46.9
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Researchers on three University of Nebraska campuses are working to complete a proposal that could make NU the first Department of Homeland Security Center of Excellence.. . .
quicktables is an iptables firewall/NAT (gateway) script generator. It was created to quickly provide a secure set of iptables rules. It will ask you to answer a small handful of questions, and generates your very own personalized firewall script. . . .
Jascha submits, L.A.S. Linux is a 'live CD' distribution of Linux which allows the applications to be run from the CD without the need for installing anything on the computer. The focus of L.A.S. is create a bootable toolkit for information security professionals and systems administrators. . . .
I am presently working on creating a taxonomy of information assurance, based on the three aspects of: Security services Information states Security countermeasures These three aspects of Information Assurance (IA) were highlighted by John McCumber [1] as well as a team . . .
A root compromise and a Trojan horse were discovered on gnuftp.gnu.org, the FTP server of the GNU project. The machine appears to have been cracked in March 2003, but we only discovered the crack in the last week of July . . .
The PaX, GentooHardened,and Adamantix projects are pleased to announce the formation of a cooperative development alliance forged to facilitate delivery of freely available software to linux using PaX in the framework.. . .
Chris Lowth submits New firewalling project seeks testers for Kazaa-blocker. "P2pwall" is a sourceforge project for the development of tools and documentation for the effective firewalling of P2P application traffic using Linux IPtables. . .
Chris Lowth submits In the world of almost daily outbreaks of Windows-focused viruses, it's nice to find the Linux can come to Redmond's aid. The "protector" project for Linux provides a software plug-in for sendmail that strips attachments . . .
A group of 11 of the largest software companies and computer security firms released the first public draft of a proposed bug disclosure standard on Wednesday, and asked the security community for comments. The 37-page document sets out a detailed . . .
A new committee at the Organization for the Advancement of Structured Information Standards (OASIS) is laying the groundwork for a new classification system to describe Web security vulnerabilities. The OASIS Web Application Security (WAS) Technical Committee will be responsible for . . .
Wireless network hardware manufacturers are keen to embrace a new security standard, but 802.11i will take another year before it is signed off. Wi-Fi product makers are lining up to lend support to a new security standard, as they try to allay concerns about transmitting data over wireless networks.. . .
Michael Rash submits psad (the Port Scan Attack Detector) is a collection of four lightweight system daemons written in Perl and C that are designed to work with Linux firewalling code (iptables in the 2.4.x kernels, and ipchains in . . .
The last several weeks, as always, have brought a constant flow of security advisories. Perhaps not a torrent, but certainly more than a mere trickle. Most notable among these is the Linux kernel ptrace vulnerability, which allows local users to acquire root privileges.. . .
A Danish security company, angry over what it perceives as censorship on several popular mailing lists, is launching "a revolution to remove SecurityFocus and CERT from power. . .
Albert Gonzalez submits, "The Bait N Switch Honeypot system is a multifaceted attempt to take honeypots out of the shadows of the network security model. We attempt to make them a participant in your systems defense. To do this, we are . . .
The Cyber Defense Exercises were started over a conversation between military officers at a Dairy Queen in Waxahachie, Texas outside of Texas A&M in 1997. Initially they joked about how cool it would be to have a cyber war competition between . . .
Underscoring growing concern over spam, the Internet Engineering Task Force (IETF) has created a new Anti-Spam Research Group (ASRG) that aims to put unsolicited commercial e-mail in its crosshairs by setting standards for spam detection and potential legislation. . . .
IBM, Oracle and Red Hat are backing efforts to ensure the Linux operating system achieves security assurances recognised by the Australian government. IBM and Oracle are working to get Linux certified under the International Common Criteria for Information Technology Security . . .
IP Security Validator is an experimental tool that allows validation of Virtual Private Network (VPN) configurations between two network interfaces. As with testing connectivity using the Ping program, IP Security Validator enables verification and validation of VPN configurations and their connectivity.. . .
Broadband wireless access took another step forward late last month when the IEEE approved 802.16a, an amendment that adds features to the group's 802.16 standard that defines the WirelessMAN air interface specification. 802.16 was developed by the IEEE's 802.16 Working . . .
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.