Language Selection

English French German Italian Portuguese Spanish

Security Leftovers

Filed under
Security
  • Friday's security updates
  • Server Hardening

    Server hardening. The very words conjure up images of tempering soft steel into an unbreakable blade, or taking soft clay and firing it in a kiln, producing a hardened vessel that will last many years. Indeed, server hardening is very much like that. Putting an unprotected server out on the Internet is like putting chum in the ocean water you are swimming in—it won't be long and you'll have a lot of excited sharks circling you, and the outcome is unlikely to be good. Everyone knows it, but sometimes under the pressure of deadlines, not to mention the inevitable push from the business interests to prioritize those things with more immediate visibility and that add to the bottom line, it can be difficult to keep up with even what threats you need to mitigate, much less the best techniques to use to do so. This is how corners get cut—corners that increase our risk of catastrophe.

  • There are no secure smartphones.
  • OpenSSH Flaw Could Leak Crypto Keys
  • How To Patch and Protect OpenSSH Client Vulnerability CVE-2016-0777 and CVE-2016-0778 [ 14/Jan/2016 ]

    The OpenSSH project released an ssh client bug info that can leak private keys to malicious servers. A man-in-the-middle kind of attack identified and fixed in OpenSSH are dubbed CVE-2016-0777 and CVE-2016-0778. How do I fix OpenSSH's client vulnerability on a Linux or Unix-like operating system?

More in Tux Machines

Android Leftovers

The origin and evolution of FreeDOS

Over the years, developers have shared with me how they use FreeDOS to run embedded systems. My all-time favorite example is a developer who used FreeDOS to power a pinball machine. FreeDOS ran an application that controlled the board, tallied the score, and updated the back display. I don't know exactly how it was built, but one way such a system could work is to have every bumper register a "key" on a keyboard bus and the application simply read from that input. I thought it was cool. People sometimes forget about legacy software, but it pops up in unexpected places. I used to be campus CIO of a small university, and once a faculty member brought in some floppy disks with old research data on them. The data wasn't stored in plaintext files, rather as DOS application data. None of our modern systems would read the old data files, so we booted a spare PC with FreeDOS, downloaded a shareware DOS program that could read the application data, and exported the data to plaintext. Read more

U.S. makes renewable energy software open source

As a longtime proponent of open source solar photovoltaic development, I am happy that the U.S. National Renewable Energy Lab (NREL) has shared all the source code for System Advisor Model (SAM), its most powerful renewable energy economic analysis software. SAM is now SAM Open Source. It is a performance and financial model designed to help make decisions about renewable energy. This is perfect timing, as the costs of solar have dropped so far that the levelized cost of electricity for solar power is less than what you are probably paying for electricity from your utility. Read more

Solus Gets Driverless Printing, Improvements to Linux Steam Integration, More

Solus' communications manager Joshua Strobl is reporting today on the latest goodies and software updates that landed recently in the software repositories of the Linux-based operating system. Read more