Security
These Articles are indexed under Security and sorted by date published.
Critical Linux security API is still a kludge
The talk lately has centred about Vista's security APIs, but Linux certainly needs improvements in this area, because AV vendors still rely on an external kernel module to implement "real time"…
Insecurity in Open Source
Debates over what methods result in the best software often pit those who favor an open-source approach against proponents of proprietary, or closed-source, development. Conventional wisdom holds…
Avoiding security blunders in Linux and IT infrastructures
When it comes to IT infrastructure security, there are things that IT managers just shouldn't do. This two-part tip is written for those who'd like to avoid making those mistakes. It covers four…
World’s first miniature computer to protect and manage laptops
Yoggie Security Systems has today announced the launch of the Yoggie Gatekeeper, a revolutionary credit-card sized computer that brings all corporateclass security applications within the reach of…
Interested in securely sharing a secret?
I needed a method for sharing a secret that required multiple agents to coordinate before the secret could be recovered. This is useful for encrypting keys used in critical backups. I decided to…
Point, click, root: System exploitation with open tools
T managers face a problem determining what products and policies are best to properly secure their network. The problem with many security products is that it is hard to validate their claims.…
Free SSL Secure Certificate for Open Source Projects from Godaddy
"Go Daddy is committed to the open source community. We want your site and data to be secure – and we’re willing to foot the cost to make them just that."
They're offering a one-year Turbo…
GRISOFT Launches Beta Program For Anti-Malware Security Suite
GRISOFT, the supplier of AVG security software, announced the availability of a public beta version of AVG Internet Security 7.5, its new comprehensive anti-malware security suite. In addition to…
Analyzing malicious SSH login attempts
Malicious SSH login attempts have been appearing in some administrators' logs for several years. This article revisits the use of honeypots to analyze malicious SSH login attempts and see what can…