Information Security News mailing list archives

Linux Security Week - May 13th 2002


From: InfoSec News <isn () c4i org>
Date: Tue, 14 May 2002 02:17:30 -0500 (CDT)

+---------------------------------------------------------------------+
|  LinuxSecurity.com                            Weekly Newsletter     |
|  May 13th, 2002                               Volume 3, Number 19n  |
|                                                                     |
|  Editorial Team:  Dave Wreski             dave () linuxsecurity com    |
|                   Benjamin Thomas         ben () linuxsecurity com     |
+---------------------------------------------------------------------+
 
Thank you for reading the LinuxSecurity.com weekly security newsletter.
The purpose of this document is to provide our readers with a quick
summary of each week's most relevant Linux security headlines.

This week, perhaps the most interesting articles include "Decoding IPsec:  
Understanding the Protocols of Virtual Private," "SSL Certificates HOWTO,"
"Buffer Overflows - What Are They and What Can I Do About Them," and "5
minutes to a Linux firewall."

* SHOW CUSTOMERS THEY'RE SAFE ON YOUR SITE *

Secure your Apache servers with an SSL digital certificate from Thawte, a
leading global certificate provider for the Open Source community.  Get
our FREE Guide to learn more about why keeping your e-business secure
helps keep it profitable.

 --> http://www.gothawte.com/rd254.html


This week, advisories were releaed for mod python, tcpdump, imlib,
sysconfig, webmin, netfilter, and dhcp.  The vendors include Conectiva,
Red Hat, and SuSE.

http://www.linuxsecurity.com/articles/forums_article-4961.html


Find technical and managerial positions available worldwide.  Visit the
LinuxSecurity.com Career Center: http://careers.linuxsecurity.com
 

+---------------------+
| Host Security News: | <<-----[ Articles This Week ]-------------
+---------------------+

* SSL Certificates HOWTO
May 10th, 2002

A first hand approach on how to manage a certificate authority (CA), and
issue or sign certificates to be used for secure web, secure e-mail, or
signing code and other usages.  This HOWTO will also deal with non-linux
applications: there is no use to issue certificates if you can't use them.

http://www.linuxsecurity.com/articles/cryptography_article-4967.html


* How secure is your password?
May 10th, 2002

In order to access computer networks, online bank or e-mail accounts, we
need a wide range of usernames and passwords.  Constant attention is
required to track what our name is in each virtual environment, and what
password is needed at that moment to access personal information.

http://www.linuxsecurity.com/articles/network_security_article-4963.html


* Buffer Overflows - What Are They and What Can I Do About Them?
May 6th, 2002

Buffer overflows have been a problem in software-based systems and
applications for a long time. One of the first significant computer
break-ins that took advantage of a buffer overflow was the Morris worm,
and that happened in November 1988. The worm took advantage of a buffer
overflow in the finger service, a service that dispenses information about
the set of users logged into a UNIX-based computer system.

http://www.linuxsecurity.com/articles/general_article-4932.html




+------------------------+
| Network Security News: |
+------------------------+

* Decoding IPsec:  Understanding the Protocols of Virtual Private
Networks
May 10th, 2002

Acquiring a deeper understanding of how virtual private networks (VPNs)
operate can be a daunting task. It traditionally has required sorting
through scattered information and deciphering technical standards that
contain a potentially confusing assortment of acronyms and algorithms.

http://www.linuxsecurity.com/articles/cryptography_article-4964.html


* Simplicity and Awareness - Keys to Network Security
May 9th, 2002

Few people believe that maintaining a sound network security posture is
easy. Those who do are deluding themselves, unless they practice two
fundamental tenets of security: simplicity and awareness.

http://www.linuxsecurity.com/articles/network_security_article-4956.html


* Firestarter: 5 minutes to a Linux firewall:  Part 2
May 8th, 2002

The following article is part two of a two part series.  "Alternately, you
could create limit rules to accept only a certain number of requests every
second. Or if you have monitoring software that requires your box to be
"pingable," you could accept ICMP requests from only a certain IP or set
of IP addresses."

http://www.linuxsecurity.com/articles/firewalls_article-4946.html



+------------------------+
|  Cryptography:         |
+------------------------+

* Security IC suppliers split over encryption methods
May 12th, 2002

Growing security concerns within the enterprise communication market are
challenging chipmakers to develop advanced, silicon-based encryption
techniques that will not erode processor performance.


http://www.linuxsecurity.com/articles/vendors_products_article-4969.html



+------------------------+
|  Vendor/Products:      |
+------------------------+

* OpenSSL 0.9.6d beta 1 released
May 10th, 2002

A first hand approach on how to manage a certificate authority (CA), and
issue or sign certificates to be used for secure web, secure e-mail, or
signing code and other usages.

http://www.linuxsecurity.com/articles/cryptography_article-4968.html


* GnuPG 1.0.7 released
May 8th, 2002

The GNU Privacy Guard (GnuPG) is GNU's tool for secure communication and
data storage.  It is a complete and free replacement of PGP and can be
used to encrypt data and to create digital signatures.  It includes an
advanced key management facility and is compliant with the proposed
OpenPGP Internet standard as described in RFC2440.

http://www.linuxsecurity.com/articles/cryptography_article-4950.html



+------------------------+
|  General:              |
+------------------------+

* Sharing seen as critical for security
May 9th, 2002

The private sector manages more than 85 percent of the nation's critical
infrastructure and must therefore collaborate with the government to
protect those resources, according to government and industry leaders
speaking at a May 8 Senate Governmental Affairs Committee hearing.

http://www.linuxsecurity.com/articles/government_article-4959.html


* Social Engineering: The Human Side Of Hacking
May 9th, 2002

A woman calls a company help desk and says she's forgotten password. In a
panic, she adds that if she misses the deadline on a big advertising
project her boss might even fire her.

http://www.linuxsecurity.com/articles/hackscracks_article-4954.html


* Security experts swarm to Honeynet challenge
May 9th, 2002

Reverse engineering project to unravel binary caught in the wild The
Honeynet Project, which has been monitoring black hat hacking activity
over the past year, has set up a new challenge to help develop reverse
engineering skills throughout the security community.
 
http://www.linuxsecurity.com/articles/intrusion_detection_article-4957.html


* Security myths costing firms
May 8th, 2002

SECURITY guru Peter Tippett loves to shock people. He invites IT
professionals to seminars on network security and then says you don't need
more network security - at least, you don't need as much as vendors want
to sell to you.  Spend up on anti-virus software if you want to, he said.

http://www.linuxsecurity.com/articles/general_article-4948.html


------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email newsletter-request () linuxsecurity com
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------



-
ISN is currently hosted by Attrition.org

To unsubscribe email majordomo () attrition org with 'unsubscribe isn'
in the BODY of the mail.


Current thread: