No. 1 to 9 of 9 Links
Attempts to "harden" (tighten the configuration of) a Red Hat or Mandrake Linux installation.
Step by step, example driven, HOWTO on building a Linux box with an aim towards strong security. Also, links to resources and mailing lists.
Exploit World - Linux Section
Known vulnerabilities on the Linux system with detailed description.
Hacking Linux Exposed
Companion Website to Hacking Linux Exposed, Osborne/McGraw-Hill. Source code from the book, updates, and other tools to secure your Linux system
Linux Audit and Intrusion Detection
InterSect Alliance are the creators of the SNARE Linux C2-style Audit module, and have a consulting background in advanced audit analysis, intrusion detection systems, and forensics for Unix and other operating systems.
Linux Security, server hardening, 1U server, 24x7 server admin, monitoring, IDS, NDS, firewalls
Information collected from many sources: feature articles, advisories, news, documentation, forums, links.
A kernel module that detects and stops overflow attacks, like Linux Buffer Overflow attack security, which aim to get an interactive access to the system.
StegFS - A Steganographic File System for Linux
StegFS is a Steganographic File System for Linux. Not only does it encrypt data, it also hides it such that it cannot be proved to be there.