|
Call for papers SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com
Overview of LIDS, Part FourThis is the fourth and final installation of a four-part series devoted to the exploration of LIDS, a Linux kernel patch that will allow users to take away the all-powerful nature of root. The first article in this series offered an overview of LIDS. The second installment looked at file restrictions, LIDS File ACLs, and LIDS enhancements of Linux capabilities. Part three discussed granting capabilities, the LIDS-specific capabilities, ACL inheritance and time-based ACLs. This segment will ex... 2001-11-29 http://www.securityfocus.com/infocus/1517
Overview of LIDS, Part ThreeThis is the third part of a four-part article devoted to the exploration of LIDS, a Linux kernel patch that will allow users to take away the all-powerful nature of root. The first article in this series offered an overview of LIDS. The second installment looked at file restrictions, LIDS File ACLs, and LIDS enhancements of Linux capabilities. This installment will discuss granting capabilities, the LIDS-specific capabilities, ACL inheritance and time-based ACLs. 2001-11-12 http://www.securityfocus.com/infocus/1510
Overview of LIDS, Part TwoThis is the second part of a four-part series devoted to an overview of LIDS, a Linux kernel patch that will allow users to take away the all-powerful nature of root in order to give programs exactly the access they need and no more. The first article in this series offered an overview of LIDS. This installment will look at file restrictions, LIDS File ACLs, and LIDS enhancements of Linux capabilities. 2001-10-31 http://www.securityfocus.com/infocus/1502
Overview of LIDS, Part OneThe Linux Intrusion Detection System (LIDS) is a Linux kernel patch that will allow users to take away the all-powerful nature of root. This article is the first part of a three-part series that will offer an overview of LIDS. This installment will offer an introduction to LIDS, including how it works, booting LIDS, sealing the kernel, and configuring LIDS. 2001-10-17 http://www.securityfocus.com/infocus/1496
Back to the Basics: Solaris and inetd.conf Part TwoThis collection of material has been written to further clarify one of the more mystical configuration files on today's Solaris Operating System. For this example, we make use of the latest distribution of Solaris (at this time, 7). The topics covered are quite familiar to most seasoned administrators, although this publication has been written with administrators from beginning to advanced skill levels in mind. This document will focus on rpc services started via inetd. 2000-03-20 http://www.securityfocus.com/infocus/1491
Back to the Basics: Solaris and inetd.conf Part OneThis collection of material has been written to further clarify one of the more mystical configuration files on today's Solaris Operating System. For this example, we make use of the latest distribution of Solaris (at this time, 7). The topics covered are quite familiar to most seasoned administrators, although this publication has been written with administrators from beginning to advanced skill levels in mind. 2000-03-20 http://www.securityfocus.com/infocus/1490
An Introduction to OpenSSL, Part Four: The SSL and TLS ProtocolsThis is the final installment in a four-part series on OpenSSL, a library, written in the C programming language, that provides routines for cryptographic primitives utilized in implementing the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. OpenSSL also includes routines for implementing the SSL and TLS protocols. This article will provide some background on the SSL protocol and its relationship to TLS. It will also discuss TLS in depth, and show how users can use O... 2001-10-03 http://www.securityfocus.com/infocus/1486
An Introduction to OpenSSL, Part Three: PKI- Public Key InfrastructureThis is the third article in a series on OpenSSL, a library written in the C programming language that provides routines for cryptographic primitives utilized in implementing the Secure Sockets Layer (SSL) protocol. In the first article in the series, we discussed some of the basics of cryptography. The second article showed how to use OpenSSL's openssl application to explore cryptographic basics. This article will introduce Public Key Infrastructure and show the commands that OpenSSL p... 2001-09-19 http://www.securityfocus.com/infocus/1466
An Introduction to OpenSSL, Part Two: Cryptographic Functions ContinuedThis is the second article in a series on OpenSSL, a library written in the C programming language that provides routines for cryptographic primitives utilized in implementing the Secure Sockets Layer (SSL) protocol. In the first article in the series, we discussed some of the basics of cryptography. This article will cover acquiring and compiling OpenSSL and explore some commands that facilitate encryption and decryption. 2001-09-05 http://www.securityfocus.com/infocus/1462
Installing djbdns for Name Service Part Two2000-07-10 http://www.securityfocus.com/infocus/1439 |
|
Privacy Statement |