Language Selection

English French German Italian Portuguese Spanish

Sealing Red Hat security gaps with open source security tools

Filed under
Software

Why pay a proprietary vendor a ton of money for a security application you can get for little or no money?

Maybe you think open source doesn't have the chops for security. Sure, you're using Apache, Tomcat, MySQL and other open source applications in mission critical situations. You're using open source network management tools, like Nagios or OpenNMS, the latter of which is a complete enterprise network management solution. None of this worries you, but you don't feel comfortable using open source tools for IT security.

Wake up and smell the coffee!

Even better, wake up and look at the applications. In this story, I will discuss the pros and cons of the open source security tools that work on the Red Hat Enterprise Linux 4.0 (RHEL4) platform. These include Snort (intrusion detection), Nessus (security scanning software) and Tripwire (host-based operating system intrusion detection).

Full Story.

More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News