...we've compiled a list of 51 open source apps that can help protect your identity. Some of these fit into traditional security categories, like anti-spam, anti-virus, and firewalls. Others, like browsers, e-mail, and PDF tools, we've included in this list because they include encryption or other security features that can help you protect yourself.
Read more »Security in Linux and how to optimise it
Over the last few years, system security has gained a lot of momentum and software professionals are focusing heavily on it. Linux is treated as a highly secure operating system, but the reality is that it too has its share of security flaws…
Read more »Category: High End Tags:
- Login to post comments
FreeBSD bug gives untrusted root access
A security bug in the latest version of the FreeBSD can be exploited to grant unprivileged users complete control over the operating system, a German researcher said Monday.
Read more »Category: High End Tags:
- Login to post comments
DNSSEC under attack?
A new vulnerability is now out that attacks DNS servers WITH DNSSSEC installed.
Read more »- Login to post comments
Does Metasploit Have a Future?
The future of Metasploit, the highly respected, open source penetration testing framework founded by renowned security expert H.D. Moore, was plunged into doubt last month following the announcement that the project had been acquired by Rapid7.
Read more »Category: High End Tags:
- Login to post comments
Total security in a PostgreSQL database
Database security is the single biggest concern with today's Web-based applications. Without control, you risk exposing sensitive information about your company or, worse yet, your valuable customers. In this article, learn about security measures you can take to protect your PostgreSQL database.
Read more »Category: High End Tags:
- Login to post comments
Estonia to open source security tools
A project to protect national internet infrastructure in Estonia is planning to publish some of the tools it has developed as open source under the European Union Public Licence (EUPL). The project, run by the National Informatics Centre (RIA), is already using a number of open source tools in its goal to monitor Estonian network traffic and prevent network problems.
Read more »Category: Government Tags:
- Login to post comments
Where Google Chrome security fails: the password
Google promises that Chrome will be a much more secure than Windows. Well, yes, but it also has one big problem as well.
Read more »Category: High End Tags:
- Login to post comments
Fedora 12 to remove unprivileged package installation
The update will require local console users to enter the root password to install new software
packages.
Category: High End Tags:
Security adapters ship with Linux SDK
Cavium announced a new line of Nitrox network security adapters that ship with a Linux SDK. The Nitrox XL CN16XX-NFBE family offers a FIPS 140-2-certified hardware security nodule (HSM) with PCI Express Gen2 connectivity and integrated Network Interface Card (NIC) functionality, says Cavium.
Read more »Category: High End Tags:
- Login to post comments
NSA helps Apple, Sun and Red Hat harden their systems
That the American National Security Agency has previously helped Microsoft harden various Windows versions is old hat, but what is news is that the NSA now also assists Apple, Sun and Red Hat with increasing the security of their operating systems.
Read more »Category: High End Tags:
- Login to post comments
Google goes for speed, security in Chrome OS
Google unveiled its Chrome operating system to the open-source community today and said it has designed the netbook OS to be faster, simpler and more secure than those offered by rivals.
Read more »Category: End User Tags:
- Login to post comments
Does Microsoft care about their customers’ security?
More than a month after the BSI, a German IT security federal agency, issued a warning about a high-risk vulnerability in Windows7, Microsoft has finally decided to warn their customers in a security advisory.
Read more »Category: Opposition Tags:
Vulnerability in the GIMP image editing tool
According to security services provide Secunia, a vulnerability in the free image editing tool GIMP (GNU Image Manipulation Program) can potentially be exploited to compromise a users system.
Read more »Category: High End Tags:
- Login to post comments
Orwellian EIF, Fake Open Source, and Security Implications
The manipulation of Europe's interoperability framework (by Microsoft lobbyists and others) is made more visible; other news of relevance
Read more »Category: Opposition Tags:
- Login to post comments