Quantcast
Channel: Open Source Security » Linux
Browsing latest articles
Browse All 10 View Live

Installing and configuring eCryptfs with a trusted platform module (TPM) key

Mike Halcrow has written a paper on Installing and configuring eCryptfs with a trusted platform module (TPM) key. This paper is available on IBM Systems Information Center along with a bunch of other...

View Article



Weak passwords – curable with pam_cracklib

By Bryan Jacobson, Linux Technology Center, IBM ( bryan.jacobson@us.ibm.com). Emily – thanks so much for the guest blogging opportunity!! On January 5th, Twitter was hacked. “I am high on crack right...

View Article

Explaining Linux Security

by George Wilson <gcwilson@us.ibm.com>, IBM Linux Technology Center Operating system security features are notoriously difficult to explain. Folks who work on security have their own specialized...

View Article

Blueprint: Using MIT-Kerberos with IBM Tivoli Directory Server backend

by Klaus Heinrich Kiwi, IBM LTC Security Team. In the Information Security world, authentication and authorization are orthogonal concepts: Authentication refers to the act of correctly identifying an...

View Article

Cost savings of encrypting confidential data

Intel has done a study on the costs associated with a stolen or lost laptop. One of the most interesting aspects of the study is that they were able to quantify how much a company saves when the...

View Article


Karmic Koala & eCryptfs

By Bryan Jacobson, Linux Technology Center. Tyler Hicks (from our team) recently attended the 5/25-29 Ubuntu Developers Summit for Karmic Koala in Barcelona, Spain. Some of Tyler’s observations on...

View Article

openCryptoki project new releases

by Klaus Heinrich Kiwi, LTC Security team The openCryptoki project, a PKCS#11 provider for Linux with support for software and hardware tokens, has released new versions for both the openCryptoki code...

View Article

sVirt Stronger Security for Linux Virtualization

By Bryan Jacobson, Linux Technology Center. While Virtualization offers many benefits, there can also be increased security risks. For example, consider a system running two hundred virtual images. All...

View Article


New Trusted Computing Blueprint published.

by Rajiv Andrade, Linux Technology Center Since the foundation of the Trusted Computing Group, previously named Trusted Computing Platform Alliance, the pillars required to win most of today’s security...

View Article


Bare Metal Versus Hosted Hypervisor Security

by George Wilson, IBM Linux Technology Center I was recently reading through the NIST “Draft Guide to Security for Full Virtualization Technologies” (SP 800-125 draft)...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images