{"id":234,"date":"2007-05-02T07:47:04","date_gmt":"2007-05-02T05:47:04","guid":{"rendered":"http:\/\/www.workshop.ch\/openmind\/2007\/05\/02\/sicherheitslosungen-auf-open-source-basis\/"},"modified":"2007-05-02T07:47:04","modified_gmt":"2007-05-02T05:47:04","slug":"sicherheitslosungen-auf-open-source-basis","status":"publish","type":"post","link":"https:\/\/www.workshop.ch\/openmind\/2007\/05\/02\/sicherheitslosungen-auf-open-source-basis\/","title":{"rendered":"Sicherheitsl\u00f6sungen auf Open-Source-Basis"},"content":{"rendered":"<div class='__iawmlf-post-loop-links' style='display:none;' data-iawmlf-post-links='[{&quot;id&quot;:1974,&quot;href&quot;:&quot;http:\\\/\\\/www.networksecurityjournal.com\\\/features\\\/open-source-security-tools-applications-resources-041007&quot;,&quot;archived_href&quot;:&quot;http:\\\/\\\/web-wp.archive.org\\\/web\\\/20100217071449\\\/http:\\\/\\\/www.networksecurityjournal.com:80\\\/features\\\/open-source-security-tools-applications-resources-041007\\\/&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-05 04:26:47&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-27 10:14:52&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-09 21:53:33&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-14 22:26:01&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-02 07:02:50&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-10 13:49:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-17 15:14:08&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-23 19:04:55&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-27 01:31:24&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-30 03:43:07&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-02 14:10:26&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-06 13:45:08&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-10 11:43:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-17 06:32:41&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-21 00:39:44&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-24 07:07:57&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-27 22:49:52&quot;,&quot;http_code&quot;:404}],&quot;broken&quot;:true,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-27 22:49:52&quot;,&quot;http_code&quot;:404},&quot;process&quot;:&quot;done&quot;}]'><\/div>\n<p>Macht es Sinn, f\u00fcr sicherheitskritische Anwendungen auf Open Source Software zur\u00fcckzugreifen? Ja, meint das <a href=\"http:\/\/www.networksecurityjournal.com\/features\/open-source-security-tools-applications-resources-041007\/\">Network Security Journal<\/a>:<\/p>\n<blockquote><p>&#171;Open source security is like a military general who shows his plans to both his allies and his enemies. On the one hand, his enemies can try to exploit the plan by targeting its weaknesses. But on the other hand, by exposing his tactics to those who want to help, the plan is ultimately much stronger as a result of their feedback and modifications.&#187;<\/p><\/blockquote>\n<p>Der Artikel <a href=\"http:\/\/www.networksecurityjournal.com\/features\/open-source-security-tools-applications-resources-041007\/\">The Open Source Security Mother Lode: 105 Tools, Applications and Resources<\/a> bietet eine kompakte \u00dcbersicht \u00fcber die wichtigsten Programme, sortiert nach den folgenden Kategorien:<\/p>\n<ul>\n<li>E-Mail<\/li>\n<li>Virenschutz<\/li>\n<li>Web-Utilities<\/li>\n<li>Firewalls<\/li>\n<li>Netzwerk-Monitoring<\/li>\n<li>Intrusion Detection<\/li>\n<li>VPN<\/li>\n<li>Wireless Networks<\/li>\n<li>Verschl\u00fcsselung<\/li>\n<\/ul>\n<!--CusAds0-->\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Macht es Sinn, f\u00fcr sicherheitskritische Anwendungen auf Open Source Software zur\u00fcckzugreifen? Ja, meint das Network Security Journal: &#171;Open source security is like a military general who shows his plans to both his allies and his enemies. On the one hand, his enemies can try to exploit the plan by targeting its weaknesses. But on the &#8230; <a title=\"Sicherheitsl\u00f6sungen auf Open-Source-Basis\" class=\"read-more\" href=\"https:\/\/www.workshop.ch\/openmind\/2007\/05\/02\/sicherheitslosungen-auf-open-source-basis\/\" aria-label=\"Read more about Sicherheitsl\u00f6sungen auf Open-Source-Basis\">Read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"generate_page_header":"","footnotes":""},"categories":[1],"tags":[477,478,479,116,240,481,476,480],"class_list":["post-234","post","type-post","status-publish","format-standard","hentry","category-open-source","tag-firewall","tag-intrusion-detection","tag-monitoring","tag-security","tag-sicherheit","tag-verschlusselung","tag-virenschutz","tag-vpn"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sicherheitsl\u00f6sungen auf Open-Source-Basis - Open Mind<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.workshop.ch\/openmind\/2007\/05\/02\/sicherheitslosungen-auf-open-source-basis\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sicherheitsl\u00f6sungen auf Open-Source-Basis - Open Mind\" \/>\n<meta property=\"og:description\" content=\"Macht es Sinn, f\u00fcr sicherheitskritische Anwendungen auf Open Source Software zur\u00fcckzugreifen? Ja, meint das Network Security Journal: &#171;Open source security is like a military general who shows his plans to both his allies and his enemies. On the one hand, his enemies can try to exploit the plan by targeting its weaknesses. But on the ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.workshop.ch\/openmind\/2007\/05\/02\/sicherheitslosungen-auf-open-source-basis\/\" \/>\n<meta property=\"og:site_name\" content=\"Open Mind\" \/>\n<meta property=\"article:published_time\" content=\"2007-05-02T05:47:04+00:00\" \/>\n<meta name=\"author\" content=\"The Open Source Guy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschrieben von\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Open Source Guy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.workshop.ch\\\/openmind\\\/2007\\\/05\\\/02\\\/sicherheitslosungen-auf-open-source-basis\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.workshop.ch\\\/openmind\\\/2007\\\/05\\\/02\\\/sicherheitslosungen-auf-open-source-basis\\\/\"},\"author\":{\"name\":\"The Open Source Guy\",\"@id\":\"https:\\\/\\\/www.workshop.ch\\\/openmind\\\/#\\\/schema\\\/person\\\/74ece7dcefab45da1c0cc78b2e48d793\"},\"headline\":\"Sicherheitsl\u00f6sungen auf Open-Source-Basis\",\"datePublished\":\"2007-05-02T05:47:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.workshop.ch\\\/openmind\\\/2007\\\/05\\\/02\\\/sicherheitslosungen-auf-open-source-basis\\\/\"},\"wordCount\":124,\"commentCount\":0,\"keywords\":[\"Firewall\",\"Intrusion Detection\",\"Monitoring\",\"Security\",\"Sicherheit\",\"Verschl\u00fcsselung\",\"Virenschutz\",\"VPN\"],\"articleSection\":[\"Open Source Software\"],\"inLanguage\":\"de-CH\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.workshop.ch\\\/openmind\\\/2007\\\/05\\\/02\\\/sicherheitslosungen-auf-open-source-basis\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.workshop.ch\\\/openmind\\\/2007\\\/05\\\/02\\\/sicherheitslosungen-auf-open-source-basis\\\/\",\"url\":\"https:\\\/\\\/www.workshop.ch\\\/openmind\\\/2007\\\/05\\\/02\\\/sicherheitslosungen-auf-open-source-basis\\\/\",\"name\":\"Sicherheitsl\u00f6sungen auf Open-Source-Basis - Open Mind\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.workshop.ch\\\/openmind\\\/#website\"},\"datePublished\":\"2007-05-02T05:47:04+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.workshop.ch\\\/openmind\\\/#\\\/schema\\\/person\\\/74ece7dcefab45da1c0cc78b2e48d793\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.workshop.ch\\\/openmind\\\/2007\\\/05\\\/02\\\/sicherheitslosungen-auf-open-source-basis\\\/#breadcrumb\"},\"inLanguage\":\"de-CH\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.workshop.ch\\\/openmind\\\/2007\\\/05\\\/02\\\/sicherheitslosungen-auf-open-source-basis\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.workshop.ch\\\/openmind\\\/2007\\\/05\\\/02\\\/sicherheitslosungen-auf-open-source-basis\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.workshop.ch\\\/openmind\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sicherheitsl\u00f6sungen auf Open-Source-Basis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.workshop.ch\\\/openmind\\\/#website\",\"url\":\"https:\\\/\\\/www.workshop.ch\\\/openmind\\\/\",\"name\":\"Open Mind\",\"description\":\"Open Source &amp; Open Content\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.workshop.ch\\\/openmind\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-CH\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.workshop.ch\\\/openmind\\\/#\\\/schema\\\/person\\\/74ece7dcefab45da1c0cc78b2e48d793\",\"name\":\"The Open Source Guy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-CH\",\"@id\":\"https:\\\/\\\/www.workshop.ch\\\/openmind\\\/wp-content\\\/plugins\\\/avatar-privacy\\\/public\\\/images\\\/mystery.svg\",\"url\":\"https:\\\/\\\/www.workshop.ch\\\/openmind\\\/wp-content\\\/plugins\\\/avatar-privacy\\\/public\\\/images\\\/mystery.svg\",\"contentUrl\":\"https:\\\/\\\/www.workshop.ch\\\/openmind\\\/wp-content\\\/plugins\\\/avatar-privacy\\\/public\\\/images\\\/mystery.svg\",\"caption\":\"The Open Source Guy\"},\"url\":\"https:\\\/\\\/www.workshop.ch\\\/openmind\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sicherheitsl\u00f6sungen auf Open-Source-Basis - Open Mind","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.workshop.ch\/openmind\/2007\/05\/02\/sicherheitslosungen-auf-open-source-basis\/","og_locale":"de_DE","og_type":"article","og_title":"Sicherheitsl\u00f6sungen auf Open-Source-Basis - Open Mind","og_description":"Macht es Sinn, f\u00fcr sicherheitskritische Anwendungen auf Open Source Software zur\u00fcckzugreifen? Ja, meint das Network Security Journal: &#171;Open source security is like a military general who shows his plans to both his allies and his enemies. On the one hand, his enemies can try to exploit the plan by targeting its weaknesses. But on the ... Read more","og_url":"https:\/\/www.workshop.ch\/openmind\/2007\/05\/02\/sicherheitslosungen-auf-open-source-basis\/","og_site_name":"Open Mind","article_published_time":"2007-05-02T05:47:04+00:00","author":"The Open Source Guy","twitter_card":"summary_large_image","twitter_misc":{"Geschrieben von":"The Open Source Guy","Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.workshop.ch\/openmind\/2007\/05\/02\/sicherheitslosungen-auf-open-source-basis\/#article","isPartOf":{"@id":"https:\/\/www.workshop.ch\/openmind\/2007\/05\/02\/sicherheitslosungen-auf-open-source-basis\/"},"author":{"name":"The Open Source Guy","@id":"https:\/\/www.workshop.ch\/openmind\/#\/schema\/person\/74ece7dcefab45da1c0cc78b2e48d793"},"headline":"Sicherheitsl\u00f6sungen auf Open-Source-Basis","datePublished":"2007-05-02T05:47:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.workshop.ch\/openmind\/2007\/05\/02\/sicherheitslosungen-auf-open-source-basis\/"},"wordCount":124,"commentCount":0,"keywords":["Firewall","Intrusion Detection","Monitoring","Security","Sicherheit","Verschl\u00fcsselung","Virenschutz","VPN"],"articleSection":["Open Source Software"],"inLanguage":"de-CH","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.workshop.ch\/openmind\/2007\/05\/02\/sicherheitslosungen-auf-open-source-basis\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.workshop.ch\/openmind\/2007\/05\/02\/sicherheitslosungen-auf-open-source-basis\/","url":"https:\/\/www.workshop.ch\/openmind\/2007\/05\/02\/sicherheitslosungen-auf-open-source-basis\/","name":"Sicherheitsl\u00f6sungen auf Open-Source-Basis - Open Mind","isPartOf":{"@id":"https:\/\/www.workshop.ch\/openmind\/#website"},"datePublished":"2007-05-02T05:47:04+00:00","author":{"@id":"https:\/\/www.workshop.ch\/openmind\/#\/schema\/person\/74ece7dcefab45da1c0cc78b2e48d793"},"breadcrumb":{"@id":"https:\/\/www.workshop.ch\/openmind\/2007\/05\/02\/sicherheitslosungen-auf-open-source-basis\/#breadcrumb"},"inLanguage":"de-CH","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.workshop.ch\/openmind\/2007\/05\/02\/sicherheitslosungen-auf-open-source-basis\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.workshop.ch\/openmind\/2007\/05\/02\/sicherheitslosungen-auf-open-source-basis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.workshop.ch\/openmind\/"},{"@type":"ListItem","position":2,"name":"Sicherheitsl\u00f6sungen auf Open-Source-Basis"}]},{"@type":"WebSite","@id":"https:\/\/www.workshop.ch\/openmind\/#website","url":"https:\/\/www.workshop.ch\/openmind\/","name":"Open Mind","description":"Open Source &amp; Open Content","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.workshop.ch\/openmind\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-CH"},{"@type":"Person","@id":"https:\/\/www.workshop.ch\/openmind\/#\/schema\/person\/74ece7dcefab45da1c0cc78b2e48d793","name":"The Open Source Guy","image":{"@type":"ImageObject","inLanguage":"de-CH","@id":"https:\/\/www.workshop.ch\/openmind\/wp-content\/plugins\/avatar-privacy\/public\/images\/mystery.svg","url":"https:\/\/www.workshop.ch\/openmind\/wp-content\/plugins\/avatar-privacy\/public\/images\/mystery.svg","contentUrl":"https:\/\/www.workshop.ch\/openmind\/wp-content\/plugins\/avatar-privacy\/public\/images\/mystery.svg","caption":"The Open Source Guy"},"url":"https:\/\/www.workshop.ch\/openmind"}]}},"_links":{"self":[{"href":"https:\/\/www.workshop.ch\/openmind\/wp-json\/wp\/v2\/posts\/234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.workshop.ch\/openmind\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.workshop.ch\/openmind\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.workshop.ch\/openmind\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.workshop.ch\/openmind\/wp-json\/wp\/v2\/comments?post=234"}],"version-history":[{"count":0,"href":"https:\/\/www.workshop.ch\/openmind\/wp-json\/wp\/v2\/posts\/234\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.workshop.ch\/openmind\/wp-json\/wp\/v2\/media?parent=234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.workshop.ch\/openmind\/wp-json\/wp\/v2\/categories?post=234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.workshop.ch\/openmind\/wp-json\/wp\/v2\/tags?post=234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}