Bookmark
Generating an SSL Certificate with Apache+mod_ssl
slacksite.com/apache/certificate.php, posted 2008 by peter in development howto security webdesign
This document is intended to be a quick guide to generating and installing an SSL certificate on an Apache web server with the mod_ssl module
Bookmark
In-flight surveillance could foil terrorists in the sky
technology.newscientist.com/channel/tech/dn14013-inflight-surveillance-could-foil-terrorists-in-the-sky.html, posted 2008 by peter in eu privacy security terrorism toread travel
The European Union's Security of Aircraft in the Future European Environment (SAFEE) project uses a camera in every passenger's seat, with six wide-angle cameras to survey the aisles. Software then analyses the footage to detect developing terrorist activ
Bookmark
The Java SASL API Programming and Deployment Guide
java.sun.com/j2se/1.5.0/docs/guide/security/sasl/sasl-refguide.html, posted 2008 by peter in development java reference security
The API supports both client and server applications. It allows applications to select the mechanism to use based on desired security features, such as whether they are susceptible to passive dictionary attacks or whether they accept anonymous authenticat
Information about installing, configuring, running and maintaining a LDAP (Lightweight Directory Access Protocol) Server on a Linux machine is presented on this document.
Bookmark
Instructions for doing authentication with LDAP
www.openldap.org/lists/openldap-software/200010/msg00097.html, posted 2008 by peter in howto linux security
Doing authentication with LDAP is hard, mainly because the information you need is scattered through a whole set of documents, and some important details are not covered at all.
As a result, I spent a week of hard work figuring out how to do it.
Bookmark
Fortify 360
www.fortify.com/, posted 2008 by peter in development java security software testing
Fortify 360 is an integrated solution for identifying, prioritizing and repairing security vulnerabilities in software and managing the business of assuring application security.
Bookmark
Anatomy of Security-Enhanced Linux (SELinux)
www.ibm.com/developerworks/linux/library/l-selinux/?ca=dgr-btw01SELinux, posted 2008 by peter in linux security toread
This article explores the ideas behind SELinux and how it's implemented.
Bookmark
CCTV boom has not cut crime, says police chief
www.timesonline.co.uk/tol/news/uk/crime/article3877670.ece, posted 2008 by peter in msm news privacy security
Billions of pounds spent on Britain’s 4.2 million closed-circuit television cameras has not had a significant impact on crime, according to the senior police officer piloting a new database.
Bookmark
Five important security apps for Linux, Mac OS X and Windows
arstechnica.com/guides/tweaks/five-security-apps-linux-osx-windows.ars, posted 2008 by peter in free linux list mac security software windows
No matter what OS you use, you need to think about security. We've got you covered with five freeware or shareware security tools for Linux boxes, Macs, and Windows machines, all recommended by Ars staffers.
Bookmark
Casino insider tells (almost) all about security
www.computerworld.com.au/index.php/id;270726757;pp;1;fp;4194304;fpid;1, posted 2008 by peter in business privacy security
Jonas promised to reveal some, if not all, of the secrets he learned about the casino industry. Before the talk, he called some of his former clients to make sure certain details could be revealed.
|< First < Previous 201–210 (222) Next > Last >|