security

0

51 Open Source Tools to Protect Your Identity

http://itmanagement.earthweb.com

...we've compiled a list of 51 open source apps that can help protect your identity. Some of these fit into traditional security categories, like anti-spam, anti-virus, and firewalls. Others, like browsers, e-mail, and PDF tools, we've included in this list because they include encryption or other security features that can help you protect yourself.

Read more »
t1000's picture
Created by t1000 12 years 24 weeks ago – Made popular 12 years 24 weeks ago
Category: End User   Tags:
0

Security in Linux and how to optimise it

http://www.linuxuser.co.uk

Over the last few years, system security has gained a lot of momentum and software professionals are focusing heavily on it. Linux is treated as a highly secure operating system, but the reality is that it too has its share of security flaws…

Read more »
smithers's picture
Created by smithers 12 years 25 weeks ago – Made popular 12 years 25 weeks ago
Category: High End   Tags:
0

FreeBSD bug gives untrusted root access

http://www.theregister.co.uk

A security bug in the latest version of the FreeBSD can be exploited to grant unprivileged users complete control over the operating system, a German researcher said Monday.

Read more »
johncuk's picture
Created by johncuk 12 years 25 weeks ago – Made popular 12 years 25 weeks ago
Category: High End   Tags:
0

DNSSEC under attack?

http://blog.internetnews.com

A new vulnerability is now out that attacks DNS servers WITH DNSSSEC installed.

Read more »
jefe's picture
Created by jefe 12 years 25 weeks ago – Made popular 12 years 25 weeks ago
Category: High End   Tags:
0

Does Metasploit Have a Future?

http://www.enterprisenetworkingplanet.com

The future of Metasploit, the highly respected, open source penetration testing framework founded by renowned security expert H.D. Moore, was plunged into doubt last month following the announcement that the project had been acquired by Rapid7.

Read more »
gurpsmad's picture
Created by gurpsmad 12 years 25 weeks ago – Made popular 12 years 25 weeks ago
Category: High End   Tags:
0

Total security in a PostgreSQL database

http://www.ibm.com

Database security is the single biggest concern with today's Web-based applications. Without control, you risk exposing sensitive information about your company or, worse yet, your valuable customers. In this article, learn about security measures you can take to protect your PostgreSQL database.

Read more »
fossfreak's picture
Created by fossfreak 12 years 26 weeks ago – Made popular 12 years 26 weeks ago
Category: High End   Tags:
0

Estonia to open source security tools

http://www.h-online.com

A project to protect national internet infrastructure in Estonia is planning to publish some of the tools it has developed as open source under the European Union Public Licence (EUPL). The project, run by the National Informatics Centre (RIA), is already using a number of open source tools in its goal to monitor Estonian network traffic and prevent network problems.

Read more »
Sheik Djibouti's picture
Created by Sheik Djibouti 12 years 26 weeks ago – Made popular 12 years 26 weeks ago
Category: Government   Tags:
0

Where Google Chrome security fails: the password

http://www.itworld.com

Google promises that Chrome will be a much more secure than Windows. Well, yes, but it also has one big problem as well.

Read more »
Sheik Djibouti's picture
Created by Sheik Djibouti 12 years 26 weeks ago – Made popular 12 years 26 weeks ago
Category: High End   Tags:
0

Fedora 12 to remove unprivileged package installation

http://lwn.net

The update will require local console users to enter the root password to install new software
packages.

Read more »
gumbi lives's picture
Created by gumbi lives 12 years 26 weeks ago – Made popular 12 years 26 weeks ago
Category: High End   Tags:
0

Security adapters ship with Linux SDK

http://www.linuxfordevices.com

Cavium announced a new line of Nitrox network security adapters that ship with a Linux SDK. The Nitrox XL CN16XX-NFBE family offers a FIPS 140-2-certified hardware security nodule (HSM) with PCI Express Gen2 connectivity and integrated Network Interface Card (NIC) functionality, says Cavium.

Read more »
toolbanger's picture
Created by toolbanger 12 years 26 weeks ago – Made popular 12 years 26 weeks ago
Category: High End   Tags:
0

NSA helps Apple, Sun and Red Hat harden their systems

http://www.h-online.com

That the American National Security Agency has previously helped Microsoft harden various Windows versions is old hat, but what is news is that the NSA now also assists Apple, Sun and Red Hat with increasing the security of their operating systems.

Read more »
clandestine's picture
Created by clandestine 12 years 27 weeks ago – Made popular 12 years 26 weeks ago
Category: High End   Tags:
0

Google goes for speed, security in Chrome OS

http://www.computerworld.com

Google unveiled its Chrome operating system to the open-source community today and said it has designed the netbook OS to be faster, simpler and more secure than those offered by rivals.

Read more »
mathewt's picture
Created by mathewt 12 years 27 weeks ago – Made popular 12 years 26 weeks ago
Category: End User   Tags:
0

Does Microsoft care about their customers’ security?

http://blogs.fsfe.org

More than a month after the BSI, a German IT security federal agency, issued a warning about a high-risk vulnerability in Windows7, Microsoft has finally decided to warn their customers in a security advisory.

Read more »
hugo's picture
Created by hugo 12 years 27 weeks ago – Made popular 12 years 27 weeks ago
Category: Opposition   Tags:
0

Vulnerability in the GIMP image editing tool

http://www.h-online.com

According to security services provide Secunia, a vulnerability in the free image editing tool GIMP (GNU Image Manipulation Program) can potentially be exploited to compromise a users system.

Read more »
keyboardninja's picture
Created by keyboardninja 12 years 27 weeks ago – Made popular 12 years 27 weeks ago
Category: High End   Tags:
0

Orwellian EIF, Fake Open Source, and Security Implications

http://boycottnovell.com

The manipulation of Europe's interoperability framework (by Microsoft lobbyists and others) is made more visible; other news of relevance

Read more »
komrad's picture
Created by komrad 12 years 29 weeks ago – Made popular 12 years 29 weeks ago
Category: Opposition   Tags:

Best karma users