Vendors/Products - Page 65.2

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Vendors/Products News

Tool Unmasks Web Server Vulnerabilities

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In response to increasingly militant attacks carried out by hackers, system administrators across the spectrum of IT have worked diligently in recent months to remove telltale signs that can classify their Web servers. However, this may fashion a false sense of confidence. . .

Watch For Top Linux/Unix Threats

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It's depressing for security professionals to see just how many of the vulnerabilities on the new SANS/FBI Top 20 List have CVE numbers in the 1999-xxxx range -- meaning that they were identified and fixed years ago on some systems. Newer . . .

Openwall Linux (Owl) 1.0 Release

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For those who don't know yet, Openwall GNU/*/Linux (or Owl) is a security-enhanced operating system with Linux and GNU software as its core, intended as a server platform. And, of course, it's free. More detailed information is available on the web site. . .

Intel beefs up network security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Intel plans to announce a new network processor on Tuesday that will handle security functions, a move it expects will reduce the cost and improve the performance of networking equipment. The company will also delay a similar product that does not offer security features.. . .

Gartner slams MS security after latest flaw

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The latest flaw with a major Microsoft product shows Redmond is unlikely to have anything that approximates to secure software until 2004 at the earliest. That's the damning assessment of analysts Gartner in response to a serious, but little publicised, vulnerability . . .

Halting the Hacker: Second Edition of Computer Security Bestseller Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Kevin Jurrens writes: Prentice Hall PTR and HP Books today announced the publication of "Halting the Hacker: A Practical Guide to Computer Security," Second Edition by Donald L. Pipkin, CISSP, Information Security Architect for the Internet Security Division of the Hewlett-Packard Company. "Halting the Hacker: A Practical Guide to Computer Security," Second Edition, combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Linux, or UNIX system.. . .

Guardian Digital Launches EnGarde to Provide Enterprises with Linux Security Solutions

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Guardian Digital, Inc., the leading open source security company, has today formerly launched the EnGarde Secure Linux server operating system, EnGarde Secure Professional. EnGarde Secure Professional is a comprehensive enterprise software solution that provides all the tools necessary to build a complete, secure online presence. This provides organizations with a cost-effective and proven platform capable of supporting thousands of Web sites and e-mail domains.. . .

Linux Worm Creating P2P Attack Network

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new worm that attacks Linux Web servers has compromised more than 3,500 machines, creating a rogue peer-to-peer network that has been used to attack other computers with a flood of data, security experts said Saturday. The worm seems to . . .

Stunnel 4.00 Builds on Prior Success

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The recent release of Stunnel version 4.00 picks up where previous versions left off by improving encryptions capabilities and simplifying installation and configuration. Late last week, the newest version of Stunnel[1], the secure SSL wrapper, was released. Stunnel encapsulates cleartext protocols . . .

Intel Launches 'LaGrande' Security Plan

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Launching its own initiative to thwart hackers, Intel Corp. on Monday unveiled a new security initiative, code-named LaGrande Technology, that it will integrate into future processors and chip sets to stymie efforts to steal data. While many computer users rely . . .

Protect Wireless LANs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Securing wireless LANs isn't easy. Just ask any network manager who has the task of adding another way to authenticate users to yet another networked device. Funk Software Inc. this week is expected to reveal enhanced versions of its Odyssey Server and Steel-Belted Radius Enterprise Edition wireless authentication applications.. . .

Password guessing games with Check Point firewall

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security researchers have discovered two potentially serious flaws with Check Point's flagship FireWall-1 firewall which give rise to both username guessing and sniffing issues. First, affected versions permit attackers to determine if a firewall username is valid without having to . . .

Apache Flaw Leaves Server Wide Open

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Although this problem doesn't affect UNIX and Linux variants, it does apply to more than just Microsoft Windows platforms. You should check it out even if you are running NetWare or OS/2 (both of which are definitely vulnerable) or any other . . .

Website Security Flaw Costs ZD

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"It used to be enough just to patch security problems, apologize and get on with business. But this case shows that (regulators) are now watching, and if you get burned, you may have a lawsuit on your hands," said Greg Shipley, chief technology officer of Neohapsis, a Chicago-based information security company that assisted the New York authorities on the case.. . .

Lobbying for Insecurity

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The U.S. National Security Agency's contribution to open-source security, Security-Enhanced Linux, found broad approval and support in geek forums from Wired News to Slashdot that are typically suspicious of the government. . .