×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.

Applications - Article Archives - Page 16

Linux Kernel Flaws Uncovered

February 19, 2004 |
Malicious attackers could gain full super-user privileges, according to a security research firm.
READ MORE

Virus Writing: Not Fun, Not Funny

February 03, 2004 |
Whatever your feelings about SCO or Microsoft, MyDoom hurts thousands of other companies, the global economy and the Internet in general.
READ MORE

AntiOnline Spotlight: MyDoom Testing Your Patience?

January 29, 2004 |
MyDoom is quickly making the days of SoBig and Blaster seem like a walk in the park.
READ MORE

Bounty Set as MyDoom Builds Zombie Army

January 28, 2004 |
As the virulent MyDoom worm races across the Internet, building an army of computer zombies potentially 500,000 strong, The SCO Group is setting a $250,000 bounty on the virus author's head.
READ MORE

Prelude to a Secure Enterprise

January 28, 2004 |
Intrusion detection systems have come a long way since their humble beginnings in the mid-1990s. A new player on open source IDS scene offers the potential to be an enterprise-class gatekeeper that could become a security administrator's new best friend.
READ MORE

AntiOnline Security Spotlight: IDS with an Open Source Twist

January 15, 2004 |
An introduction to intrustion detection systems and basics on protecting your network with Snort.
READ MORE

Graceful UPS Shutdowns on Linux

January 07, 2004 |
There's nothing pleasant about the data corruption or even hardware damage that can result from a power failure. Carla Schroder explores how UPS units and a couple of Linux UPS tools can help safeguard your mission-critical computers.
READ MORE

Study Finds Fewer Flaws in Open-source Code

December 16, 2003 |
Software inspection firm Reasoning says MySQL source code contained fewer flaws than its commercial counterparts. But others question Reasoning's reasoning.
READ MORE

Linux in the Security Crosshairs

December 12, 2003 |
Experts say breaches at two popular Linux projects underscore one important fact: security affects everyone.
READ MORE

The Future of Open Source in Security

November 19, 2003 |
Fresh from the 2nd Annual Open Source Symposium, Lyne Bourque reports on how open source is contributing to network security for enterprises.
READ MORE

Primary Response 2.0 Mimics Immune System to Prevent Intrusions

November 12, 2003 |
Sana Security's latest version of its host-based intrusion prevention system searches for vulnerabilities using an approach based on principles of the human immune system.
READ MORE

Linux Security: Tips from the Experts

October 29, 2003 |
Concerned about the security of your Linux environment or looking for ways to beef up your existing security? Two Linux security pros share tips to help you get up to speed on the latest Linux security advancements.
READ MORE

AntiOnline Security Spotlight: Linux a Hacker's Delight?

September 25, 2003 |
Sure, Microsoft seems to be suffering a relentless assault on Windows security. However, data suggests that Linux is becoming a hacker's paradise.
READ MORE

CERT Issues Warning for OpenSSH Flaw

September 17, 2003 |
A buffer management vulnerability in versions of the popular OpenSSH tool could lead to DoS condition or harmful code execution.
READ MORE

Linux Takes Brunt of Digital Attacks

September 11, 2003 |
Linux remains the most attacked online server operating system, according to a new report.
READ MORE

OSI Leader Asks Hacker to Stop SCO Attack

August 26, 2003 |
SCO Group recovers from a denial of service attack that took out its site for the weekend, after a leader of the Open Source Initiative argues that the attacks don't help the community's cause.
READ MORE

Spam and Viruses: Unholy Matrimony, Part 1

August 04, 2003 |
Make no mistake about it -- spam and viruses are deliberate, malicious assaults on our systems that often work together to penetrate and compromise our networks. Carla Schroder's new series takes a look at server-level and client-side defenses for defeating the two-headed monster.
READ MORE

"Hacking Exposed" Chat

June 17, 2003 |
Update: The 'go to' site for everything from removing grass stains to building beowulf clusters redently hosted a chat with the authors of 'Hacking Exposed'. Transcripts are available online.
READ MORE

Building Firewalls with iptables, Part 2

June 10, 2003 |
Exposing any system, no matter how briefly, to an untrusted network is suicidal. A firewall is absolutely vital, and fortunately, the Linux world offers an excellent free firewall utility in netfilter/iptables. Carla Schroder takes a deeper look at iptables with additional rules and scripts for basic firewalling and sharing Internet connections.
READ MORE

Building Firewalls with iptables, Part 1

May 28, 2003 |
Exposing any system, no matter how briefly, to an untrusted network is suicidal. A firewall is absolutely vital, and fortunately, the Linux world offers us an excellent free firewall utility in netfilter/iptables.
READ MORE