Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security

Submission + - Web under attack by Al Qaeda

shanen writes: Don't put my name on it, and I'm not going to provide any evidence, but if you dig around a bit, maybe you can find it. Just a tip to let you know the Internet is under attack by Al Qaeda sympathizers.
Security

Submission + - The Secret Sauce In Secure Software (360is.com)

An anonymous reader writes: Researchers at independent Three Sixty Information Security have analysed 7 of their most frequently recommended tools for network and system administrators. Among the regulars like ssh and nmap are some tools less commonly known for their security admin credentials. The article examines each on its merits and uses the results to build a screen for evaluating future projects. Finally it attempts to answer the question; "What makes this software so uncommonly good?"

The results may surprise you.

Programming

Submission + - What makes for secure software? (360is.com)

An anonymous reader writes: Three Sixty Information Security have analysed 7 of their most frequently recommended tools for network and system administrators. Among the regulars like ssh and nmap are some tools less commonly known for their security admin credentials. The article examines each on its merits and uses the results to build a screen for evaluating future projects. Finally it attempts to answer the question; "What makes this software so uncommonly good?""
Security

Submission + - Researchers Discover the Secret To Secure Software

nickh01uk writes: "The guys at Three Sixty Information Security have published the results of their analysis on 7 of the most popular security tools in common use by systems administrators. The articles examines the tools on their merits and attempts to pull together common threads running through each. Finally they put forward their answer to the question "What makes this software so uncommonly good?"

From TFA, the recommended tools are: nmap, ssh, syslog-ng, postfix, rsync, and sudo."
Security

Nmap From an Ethical Hacker's Point of View 115

ddonzal notes a new tutorial that introduces Nmap from the viewpoint of an ethical hacker. (Part 1 of 2 parts is up now.) The author is Kirby Tucker, who writes: "After completing this 2 Part Series and having practiced the techniques described, one should not only be able to sit at a 'roundtable' with advanced security professionals and 'hold their own' in a discussion concerning Nmap, but also utilize this great tool in protecting their own network."
Networking

Submission + - Nmap from an Ethical Hacker's View Part 1 (ethicalhacker.net) 1

ddonzal writes: "What, another Nmap tutorial? Yes that's true, but I am hoping to approach it a little differently than what I have seen available. I want to describe Nmap from the viewpoint of an ethical hacker and at the same time give a clear, step-by-step method of attaining a good level of proficiency. After completing this 2 Part Series and having practiced the techniques described, one should not only be able to sit at a "roundtable" with advanced security professionals and "hold their own" in a discussion concerning Nmap, but also utilize this great tool in protecting their own network. http://www.ethicalhacker.net/content/view/155/1/"
Security

Submission + - What makes a great security tool? (360is.com) 1

Anonymous Coward writes: "Three Sixty Information Security have analysed 7 of their most frequently recommended tools for network and system administrators. Among the regulars like ssh and nmap are some tools less commonly known for their security admin credentials. The article examines each on its merits and uses the results to build a screen for evaluating future projects. Finally it attempts to answer the question; "What makes this software so uncommonly good?""
Linux Business

Submission + - Citrix Announces Acquisition of Xensource (citrix.com) 1

dch24 writes: Citrix announced today in a press release that they will acquire XenSource for $500M. Over at ZDNet UK, "XenSource is a small company, claiming 500 paying customers and 5,000 production users."

This comes hard on the heels of the VMWare IPO. An eWeek article suggests, "The Citrix-XenSource deal might pressure VMware to drop the price on some of its products. To increase the pressure, Citrix announced that it will begin selling XenSource's products through its roughly 5,000 channel partners."

How will this affect the open-source Xen hypervisor? The press release says, "The acquisition will also strengthen each company's strong partnership with Microsoft and commitment to the Windows platform." Does that mean a change in direction?

Operating Systems

Submission + - XenSource releases product, gets bought by Citrix (networkworld.com) 1

billstewart writes: XenSource has been in the news twice this week — Monday they release a product, then Tuesday they get bought for $500m by Citrix. Here's Network World's take on the buyout and on the product. It looks like the product is packaging new releases of several of their components — there's a 64-bit hypervisor version 3.1 that uses the Intel and AMD hardware tricks, APIs, management tools, and XenMotion, which lets you move running virtual machines around. According to Xen's product page, the free-beer XenExpress version gets the hypervisor, APIs, and some of the management tools, but not the fancier management or XenMotion, and it's somewhat crippled in terms of capacity (max 4 VMs, 2 CPUs, 4GB RAM, while the commercial versions support 128GB total RAM, larger VMs, and unlimited VMs and CPUs.)

(But will it run Linux?) It will run Linux — one of the data sheets implies that Linux only runs in 32-bit mode, while Windows can run 64-bit. Perhaps there's more documentation that provides more details.

Linux Business

Submission + - Citrix acquire Xen source (citrix.com) 1

Mister-TECH writes: "Citrix has signed a definitive agreement to acquire XenSource a leader in enterprise-grade virtual infrastructure solutions. The acquisition moves Citrix into adjacent and fast growing datacenter and desktop virtualization markets. The combination of Citrix and XenSource brings together strong technical, customer, partner, channel and go-to-market synergies that will make virtualization solutions easier to use and dynamically combined more relevant to business. The acquisition will also extend Citrix's leadership in the broader Application Delivery Infrastructure market by adding key enabling technologies that make the end-to-end computing environment far more flexible, dynamic and responsive to business change."
Software

Submission + - Citrix to buy XenSource for $500m 1

Penguinisto writes: Apparently Citrix doesn't want to be left out in the cold when it came to Virtualization.So, it decided to snap up Xen Source in whole, with a combination of cash and stock. Question is, what impact exactly will this have on Linux as a whole? (Xen runs on/under Windows too, but Linux is arguably its biggest playground to date). Also, is this a defensive move on Citrix' part, given Microsoft's development of potential VMWare and Xen competitor Viridian?
Software

Submission + - Citrix acquires XenSource virtualization software (networkworld.com) 1

coondoggie writes: "Citrix Systems agreed to acquire XenSource today in a deal valued at $500 million. The recently rumored deal will let Citrix enter the server and desktop virtualization markets, long dominated by VMware, who went public yesterday and whose shares are trading at $51 at the close of trading. Investment banking firm Jefferies & Company issued a report Tuesday on Citrix titled "Citrix-Xen Makes Perfect Strategic Sense." The company says Citrix's close relationship with Microsoft — the two have worked together for years on thin-client technology — is key in that Citrix could help Microsoft make up ground on VMware, whose successful IPO on Tuesday confirmed its leadership role in the emerging virtualization market. http://www.networkworld.com/news/2007/081507-citri x-xensource-desktop-server-virtualization.html"
Security

Submission + - How can you spot secure software at a distance? (360is.com)

nickh01uk writes: "Independent security researchers have compiled a list of their most frequently recommended security infrastructure components, drawn out the common threads that each shares, and attempt to answer the question "What makes this software so uncommonly good?". They then use this knowledge to put forward a straw-man for evaluating future tools and software for use in secure environments. Not everyone will agree with their choices, but many will appreciate the conclusions."

Slashdot Top Deals

"Here's something to think about: How come you never see a headline like `Psychic Wins Lottery.'" -- Comedian Jay Leno

Working...