Language Selection

English French German Italian Portuguese Spanish

Malware Warning (resolved)

Filed under
Site News

I have been informed that my site was producing malware warnings from Google. Google web tools reported that some malicious ads were possibly being served through my OpenX ad server. OpenX has been removed and the database deleted. You would have only encountered the infected sites if you had followed one of malicious ads and landed on a site delivering the malware. But since openX is gone for now, tuxmachines.org is completely safe as are the google ads that remain.

I just hope google will remove the warning with their next crawl. I have requested a review. Until then you can safely add tuxmachines.org to list of safe sites to avoid the warning.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

more warnings

Seems like Firefox (windows version) is warning as well.

I can reach TM via IE8 (using GoogleDNS) but FF (using GoogleDNS) spawns a malware warning.

Here's the link it offers to get "de-listed"

http://www.stopbadware.org/firefox?hl=en-US&url=http%3A%2F%2Fwww.tuxmachines.org%2F

You can also disable the autoblock in Firefox by:

"Can I disable the attack site warnings in Firefox? Yes, but doing so will leave your computer more vulnerable to being infected with badware. If you are willing to accept this risk, you may disable the warnings in the Firefox options/preferences by clicking the Security tab, unchecking “Block reported attack sites,” and clicking OK. "

re: warnings

I already put in for a review there too. They said a couple days there. Google said weeks. Sad

indeed

Yep, Indeed I noticed it as well and couldn't believe my eyes Smile
Today the warning is gone, though.

http://img.nux.ro/Screenshot-tuxmachines.png

More in Tux Machines

BSD Leftovers

  • FreeBSD Q2'2016: EFI Improvements, Prepping For FreeBSD 11.0, Package Updates
    For FreeBSD fans not closely following its development on a daily basis, the FreeBSD project has released their Q2'2016 quarterly status report that covers various activities going on around this BSD operating system project.
  • EuroBSDCon 2016 schedule has been released
    The EuroBSDCon 2016 talks and schedule have been released, and oh are we in for a treat! All three major BSD's have a "how we made the network go fast" talk, nearly every single timeslot has a networking related talk, and most of the non-networking talks look fantastic as well.

Security News

  • Linux Security Automation at Scale in the Cloud
    Ten years ago it didn’t seem like Linux growth could increase any faster. Then, in 2006, Amazon launched Amazon Web Services (AWS). Linux growth went from linear to exponential. AWS competitors sprang up and were acquired by IBM, Microsoft, and other big players, accelerating Linux expansion even more. Linux became the platform of choice for the private cloud. But this movement wasn’t confined to the cloud. A rush to create Linux applications and services spilled over to traditional on premises. Linux had evolved from that obscure thing people ran web servers on to the backbone operating system of the majority of IT.
  • Don’t want to get hacked? Close your laptop.
    My friends often leave their computers open and unlocked. I tell them they should probably get in the habit of locking their computers, but they don’t listen to me. So I’ve created a simple project to hack my friends and show them the importance of computer security. All I need to do is wait for them to leave their computer unlocked for a few seconds, open up their terminal, and type a single, short command.
  • Citibank IT guy deliberately wiped routers, shut down 90% of firm’s networks across America
    It was just after 6pm on December 23, 2013, and Lennon Ray Brown, a computer engineer at the Citibank Regents Campus in Irving, Texas, was out for revenge. Earlier in the day, Brown – who was responsible for the bank’s IT systems – had attended a work performance review with his supervisor. It hadn’t gone well. Brown was now a ticking time bomb inside the organisation, waiting for his opportunity to strike. And with the insider privileges given to him by the company, he had more of an opportunity to wreak havoc than any external hacker.
  • Explo-Xen! Bunker buster bug breaks out guests from hypervisor
    A super-bug in the Xen hypervisor may allow privileged code running in guests to escape to the underlying host. This means, on vulnerable systems, malicious administrators within virtual machines can potentially break out of their confines and start interfering with the host server and other guests. This could be really bad news for shared environments. All versions of open-source Xen are affected (CVE-2016-6258, XSA-182) although it is only potentially exploitable on x86 hardware running paravirtualized (PV) guests. The bug was discovered by Jérémie Boutoille of Quarkslab, and publicly patched on Tuesday for Xen versions 4.3 to 4.7 and the latest bleeding-edge code.
  • Intel Puts Numbers on the Security Talent Shortage
    The cybersecurity shortfall in the workforce remains a critical vulnerability for companies and nations, according to an Intel Security report being issued today. Eighty-two percent of surveyed respondents reported a shortage of security skills, and respondents in every country said that cybersecurity education is deficient.

Android Leftovers

today's howtos