Information Security News mailing list archives

Linux Security Week - September 8th 2003


From: InfoSec News <isn () c4i org>
Date: Tue, 9 Sep 2003 03:11:20 -0500 (CDT)

+---------------------------------------------------------------------+
|  LinuxSecurity.com                            Weekly Newsletter     |
|  September 8th, 2003                           Volume 4, Number 36n |
|                                                                     |
|  Editorial Team:  Dave Wreski             dave () linuxsecurity com    |
|                   Benjamin Thomas         ben () linuxsecurity com     |
+---------------------------------------------------------------------+

Thank you for reading the LinuxSecurity.com weekly security newsletter.
The purpose of this document is to provide our readers with a quick
summary of each week's most relevant Linux security headlines.

This week, perhaps the most interesting articles include "FreeBSD Jails,"
"Wireless Gone Wild: Time to Plan Your WLAN," "Intrusion Detection
Terminology," and "How many security vulnerabilities a month are
acceptable?"

---- >> FREE Apache SSL Guide from Thawte << ----
Are you worried about your web server security?  Click here to get a FREE
Thawte Apache SSL Guide and find the answers to all your Apache SSL
security needs.

 Click Command:
 http://ads.linuxsecurity.com/cgi-bin/newad_redirect.pl?id=vertad_thawteapache


LINUX ADVISORY WATCH:
This week, advisories were released for sendmail, gdm, node, pam_smb,
vmware, horde, phpwebsite, eroaster, mindi, gallery, atari800, sendmail,
and up2date. The distributors include Conectiva, Debian, Gentoo, Red Hat,
and Turbo Linux.

http://www.linuxsecurity.com/articles/forums_article-7905.html

---

FEATURE: A Practical Approach of Stealthy Remote Administration

This paper is written for those paranoid administrators who are looking
for a stealthy technique of managing sensitive servers (like your
enterprise firewall console or IDS).

http://www.linuxsecurity.com/feature_stories/feature_story-149.html

---

Basic Intrusion Prevention using Content-based Filtering

This article will discuss a very useful but seemingly overlooked
functionality of Netfilter, a firewall code widely used in Linux, that
provides content matching and filtering capabilities.

http://www.linuxsecurity.com/feature_stories/feature_story-148.html


-->  Take advantage of the LinuxSecurity.com Quick Reference Card!
-->  http://www.linuxsecurity.com/docs/QuickRefCard.pdf

+---------------------+
| Host Security News: | <<-----[ Articles This Week ]-------------
+---------------------+


* FreeBSD Jails
September 5th, 2003

Those familiar with Java recognize the security concept of a sandbox. For
those that aren't, it's the concept that everyone gets a unique,
well-equipped sandbox to play in, and a person in one sandbox isn't
allowed into anyone else's sandbox, not even to share anything with anyone
else.

http://www.linuxsecurity.com/articles/server_security_article-7914.html


* The Newest Front in the Anti-Spam Wars
September 5th, 2003

As spammers dream up new strategies for slithering into e-mail inboxes
worldwide, their counterparts, anti-spam software developers, are always
on the lookout for new ways to stop them cold. A bevy of companies think
they may have a good answer in challenge-response technology.

http://www.linuxsecurity.com/articles/privacy_article-7910.html


* Password Overload
September 4th, 2003

If you're anything like the rest of us, you have user names and passwords
floating around cyberspace and, even worse, you're doing a poor job at
keeping them a secret.  I'll admit that I have at least a half-dozen names
and passwords taped to the outer part of my computer screen. I know that's
a bad thing, but I also know that I'm not alone.

http://www.linuxsecurity.com/articles/host_security_article-7903.html


* Analyze This!
September 2nd, 2003

Whether you have one machine connected to the Internet or ten thousand,
keeping your network secure should be a top priority. You patch your web
server and are mindful of your firewall configuration, but is your site
really secure? How do you check it?

http://www.linuxsecurity.com/articles/network_security_article-7892.html


* Securing MySQL: step-by-step
September 2nd, 2003

MySQL is one of the most popular databases on the Internet and it is often
used in conjunction with PHP. Besides its undoubted advantages such as
easy of use and relatively high performance, MySQL offers simple but very
effective security mechanisms.

http://www.linuxsecurity.com/articles/server_security_article-7894.html


+------------------------+
| Network Security News: |
+------------------------+

* Wireless Gone Wild: Time to Plan Your WLAN
September 5th, 2003

One day, wireless networks will blend so seamlessly with the wired
infrastructure that wireless LANs (WLANs) will cease to exist as a
separate category. While that day may be indeed glimmering on the
networking horizon, it definitely hasn't dawned yet. At this point,
network managers still face a number of choices specific to wireless
networks.

http://www.linuxsecurity.com/articles/network_security_article-7906.html


* Wireless Security: Is WPA Good Enough?
September 5th, 2003

With wireless access points proliferating into hotels, airports and
convention centers, there is a real need for security enhancements that
will make the corporate world more confident in Wi-Fi technology, says
Yankee Group wireless/mobile services director Roberta Wiggins.
"Enterprises are currently hesitant on extending employee access into the
public Wi-Fi arena," she told NewsFactor.

http://www.linuxsecurity.com/articles/network_security_article-7911.html


* Pocket-Sized Wireless Detection
September 4th, 2003

There you are: sitting in your favorite bookstore/caf, sipping a caramel
latte and casually leafing through the latest copy of Wired magazine when
you are suddenly bombarded from almost every direction without warning and
with no means to stop it. Fortunately, the storm you are caught in is made
up of 802.11 packets which are traveling in the 2.4 or 5 gigahertz range
and pose no real physical danger to you or those around you.

http://www.linuxsecurity.com/articles/network_security_article-7902.html


* Intrusion Detection Terminology (Part One)
September 4th, 2003

Intrusion Detection Systems (IDS) are still in their infancy, but in terms
of development they are evolving at an extraordinary rate. The terminology
associated with IDS is evolving just as rapidly. As a result of IDS' rapid
growth and the marketing prowess of some IDS vendors, some confusion has
arisen about the correct meaning of key terms. In some cases the same term
may be used by different vendors to mean different things.

http://www.linuxsecurity.com/articles/intrusion_detection_article-7901.html


* Inside NIP Hype
September 1st, 2003

Battle lines have been drawn, and volleys are being lobbed between the
analyst and vendor camps. In dispute: Whether intrusion prevention is out
of commission or the next network security salvation. On one side, Gartner
has cast intrusion detection into its "Trough of Disillusionment," saying
the tech has stalled and calling for these functions to move into
firewalls. Meanwhile, intrusion-prevention product vendor ForeScout
Technologies vows to identify and block attackers "with 100 percent
accuracy."

http://www.linuxsecurity.com/articles/network_security_article-7888.html


+------------------------+
| General Security News: |
+------------------------+

* Privacy's New Image
September 5th, 2003

Where privacy is concerned, Americans distrust their government. But
they'll gladly hand over their personal information to a corporation to
get a deal on their groceries.  Europeans, on the other hand, will give
their government extremely broad surveillance powers, but they largely
forbid private enterprise from accessing any personal data without their
express written consent.

http://www.linuxsecurity.com/articles/privacy_article-7912.html


* How many security vulnerabilities a month are acceptable?
September 3rd, 2003

Reading through responses to an article I wrote about Mad Hatter and the
broader subject of auto-immune code, and since I am working on a project
for a client that involves Sun products in a security context, it begs me
to ask the question - are twenty security vulnerabilities in one month an
acceptable number for Sun customers?

http://www.linuxsecurity.com/articles/vendors_products_article-7897.html

------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email newsletter-request () linuxsecurity com
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------



-
ISN is currently hosted by Attrition.org

To unsubscribe email majordomo () attrition org with 'unsubscribe isn'
in the BODY of the mail.


Current thread: