Linux Links Directory

Top : Security

Categories:

>Articles

>FAQ

>Mailing_Lists

Links:

  • 80 of the Best Linux Security Applications
    A compilation of 80 of the best Linux security applications which help to protect the integrity of a system. For each application we have created its own portal page, providing a detailed description of the software, its features, with links to other relevant resources.
  • CERT
    a computer security organization, that helps companies defend themselves from attacks
  • CIAC Security
    Computer Incident Advisory Capability: provides on-call technical assistance and information to Department of Energy (DOE) sites faced with computer security incidents
  • CIPE
    a system for simple, yet reasonably secure IP encryption
  • Crypto-Gram
    Crypto-Gram is a free monthly e-mail newsletter on computer security and cryptography from Bruce Schneier (author of Applied Cryptography, inventor of Blowfish and Twofish, CTO and founder of Counterpane Internet Security, Inc., general crypto pundit and occasional crypto curmudgeon).
  • Flask
    Flux Advanced Security Kernel: n operating system security architecture that provides policy flexibility. The architecture has been prototyped in a microkernel-based research operating system
  • GNUPG
    GNUPG is a complete and free replacement for PGP. Because it does not use IDEA or RSA it can be used without any restrictions. GNUPG is in most aspects compatible with the OpenPGP draft.
  • Hack In The Box
    Hack In The Box is an Information Security site dedicated to keeping knowledge free.
  • InfoSysSec
    A security portal for information system security professionals.
  • Insecure.org
    for information about computer security, nmap, hacking and Linux
  • LiNUX Horizon
    Provides information about linux tunneling, clustering and other things.
  • LinuxSecurity.com
    intended as a pro-Linux and Open Source site that strives to provide objective and helpful information for the general Linux and Open Source community
  • Mycrypto.net
    encryption and privacy in the digital age. Find out how cryptography can be used in protecting your privacy and security on the Internet
  • PGP - Pretty Good Privacy
    a high-security cryptographic software application that allows people to exchange messages with both privacy and authentication
  • SANS Institute
    SANS Institute is a cooperative research and education organization dedicated to helping security professionals, systems administrators and network administrators learn and find solutions to the various problems and challenges they face.
  • Secunia
    provides Internet security services. Specialized in alerts and advisories against vulnerabilities to companies worldwide
  • Securing & Optimizing Linux: Red Hat Edition
    Securing & Optimizing Linux: Red Hat Edition addresses unanswered questions about Linux security and optimization in the marketplace. It is intended for a technical audience and discusses how to install a Red Hat Linux Server with all the necessary security and optimization for a high performance Linux specific machine. It covers in detail several ways to configure tasks' security and optimization.
  • Security Focus
    designed to facilitate discussion on security related topics and create security awareness
  • The Information Security Glossary
    terms listed within this Glossary and Reference represent a varied selection of the terms used in the world of IT, Security, and Business, all of which have some connection with the subject of Information Security
  • Trinux: A Linux Security Toolkit
    a ramdisk-based Linux distribution that boots from a single floppy or CD-ROM, loads it packages from an HTTP/FTP server, a FAT/NTFS/ISO filesystem, or additional floppies. Trinux contains the latest versions of popular Open Source network security tools for port scanning, packet sniffing, vulnerability scanning, sniffer detection, packet construction, active/passive OS fingerprinting, network monitoring, session-hijacking, backup/recovery, computer forensics, intrusion detection, and more




Share this article