Server Security - Page 49.25

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Server Security News

Apache 1.3.12 Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Apache Software Foundation and The Apache Server Project are pleased to announce the release of version 1.3.12 of the Apache HTTP server. The primary changes in this version of Apache are those related to the ``cross site scripting'' . . .

ITS4 software security scanner

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

John Viega posted the following message to bugtraq announcing a new security auditing tool. "I've put together a command-line tool for statically scanning C and C++ source code for security vulnerabilities. The tool is . . .

FBI Hacker Caseload Multiplies

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The E-Commerce Times writes, "The rash of hacker attacks against Web sites continued this week, directed mainly against e-commerce sites, and the FBI reportedly is now investigating a total of 17 distributed denial-of-service (DDoS) intrusions." . . .

Hackers Hit Biotech Site

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

ZDNet writes, "A suspected computer hacker boosted the stock of Aastrom Biosciences Inc. on Thursday by posting a fake press release on the company's Web site announcing a merger with California biopharmaceutical company Geron Corp." . . .

Solaris and Linux Vulnerable to Attack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Sherman Fridman writes ... "Responding to the recent flurry of incapacitating attacks on various major Web sites such as Yahoo and eBay, Network Associates, Inc., has launched a new business-to-business service called myCIO.com which allows enterprises to click on to . . .

Yahoo Attacked!

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I think most of us probably noticed Yahoo.com being down today. I didn't believe it until I did three seperate traceroutes from three different hosts with Internet backbone connections. Johnathan Dube writes ... "Yahoo! came under attack today and . . .

Can You Trust Trusted Parties?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

One of the most difficult decisions in any given enviroment is the distribution of trust. Who can you trust and with how much access? If you have a Systems Administrator on-site then they probably have super user access . . .

Future denial of service attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Denial of service attacks are a part of life on the Internet. They are generally speaking the easiest attacks to commit since they require minimal skill, only a minimum of knowledge about your intended victim's network, and can be done . . .

Improve Security At the Kernel Level

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Many Linux administrators often think about securing their systems from the top down (or perhaps the outside in). Significant focus is placed on Firewalls, packet filtering, limiting or denying dangerous services and controlling available programs and local permissions. . . .