Language Selection

English French German Italian Portuguese Spanish

The Open Source Security Motherload: 105 Tools, Applications and Resources

Filed under
Software

Open source security is like a military general who shows his plans to both his allies and his enemies. On the one hand, his enemies can try to exploit the plan by targeting its weaknesses. But on the other hand, by exposing his tactics to those who want to help, the plan is ultimately much stronger as a result of their feedback and modifications.

Open source applications make their source code publicly available for any user to download, compile and execute. This makes it possible for developers to modify different aspects of the program to their needs. However, it also makes it extremely easy for malicious coders to find and use exploits in the software against unsuspecting users.

To prevent this from happening, open source software employs some of the highest forms of security around, and when it comes to open source security applications, that bar is set even higher. After all what good would a network firewall or intrusion detection system be if a user were able to penetrate the system because of an exploit in the source code?

In this article we have compiled 105 open source tools, applications, and resources to expose you to the diversity of open source options available, as well as to help you better assess the costs and benefits of open source security integration into your system.

Full Story.

More in Tux Machines

today's howtos

Microsoft and Linux

GNOME News

  • gnome-boxes: Coder’s log
    So another two weeks have passed and it’s time to sum things up and reflect a little on the struggles and accomplishments that have marked this time period, which was quite a bumpy ride compared to the others, but definitely more exciting.
  • GNOME Keysign 0.6
    It’s been a while since I reported on GNOME Keysign. The last few releases have been exciting, because they introduced nice features which I have been waiting long for getting around to implement them.
  • Testing for Usability
    I recently came across a copy of Web Redesign 2.0: Workflow That Works (book, 2005) by Goto and Cotler. The book includes a chapter on "Testing for Usability" which is brief but informative. The authors comment that many websites are redesigned because customers want to add new feature or want to drive more traffic to the website. But they rarely ask the important questions: "How easy is it to use our website?" "How easily can visitors get to the information they want and need?" and "How easily does the website 'lead' visitors to do what you want them to do?" (That last question is interesting for certain markets, for example.)

SUSE Leftovers

  • Newest Tumbleweed snapshot updates KDE Applications
    The latest openSUSE Tumbleweed snapshot has updated KDE Applications in the repositories to version 16.04.3. Snapshot 20160724 had a considerably large amount of package updates for Tumbleweed KDE users, but other updates in the snapshot included updates to kiwi-config-openSUSE, Libzypp to version 16.1.3, yast2-installation to version 3.1.202 and Kernel-firmware to 2016071
  • Highlights of YaST development sprint 22
    openSUSE Conference’16, Hackweek 14 and the various SUSE internal workshops are over. So it’s time for the YaST team to go back to usual three-weeks-long development sprints… and with new sprints come new public reports! With Leap 42.2 in Alpha phase and SLE12-SP2 in Beta phase our focus is on bugs fixing, so we don’t have as much fancy stuff to show in this report. Still, here you are some bits you could find interesting.