Language Selection

English French German Italian Portuguese Spanish

Security

Anonabox Gets Kicked from Kickstarter, Shows Up on Indiegogo with Updated Specs

Filed under
GNU
Linux
Security

The online community tore the project apart and discovered that the makers of Anonabox were disingenuous when they were saying that it was something original, custom built. As it turned out, it was actually a repurposed Chinese device with a slightly better memory. Also, the operating system used was OpenWRT, which is basically Linux distro for routers and other such devices. Most, if not all of the information provided on Kickstarter was a lie. Eventually, the Kickstarter project was suspended and no one got hurt, financially.

Read more

Shuttleworth Explains Why Open Source is More Secure than Closed Source [VIDEO]

Filed under
Security
Ubuntu

In 2014, open source technology came under a heavy barrage of criticism as a result of high-profile security vulnerabilities. Mark Shuttleworth, the founder of Ubuntu Linux and its lead commercial sponsor Ubuntu, has a very different view and remains a stalwart defender of the open source model for software development and security.

In a video interview with Datamation, Shuttleworth details his view on open-source security as Ubuntu Linux celebrates its 10th anniversary.

In 2014, the Heartbleed vulnerability in the open source OpenSSL cryptographic library had wide ranging impact. OpenSSL is widely deployed on servers, VPNs and even mobile devices and it took some time for vendors and users to get systems and devices patched.

"We have a big responsibility to proactively make sure that the system is as robust in the face of inevitable flaws as it can be," Shuttleworth said.

Read more

Open Source Privacy Tools NSA Can't Crack: OTR, PGP, RedPhone, Tor And Tails

Filed under
OSS
Security

In a recent talk at the Chaos Communication Congress, Jacob Appelbaum, who is a core member of the Tor Project and is now working with Der Spiegel and Laura Poitras to analyze the Snowden documents, unveiled some documents showing which tools NSA couldn't crack.

Read more

Believe It or Not, Boeing's Super-Secure Android Smartphone Comes With the Best of BlackBerry

Filed under
Android
Security

As it turns out, Boeing might actually be BlackBerry's best friend right now. You see, the ultra-secure Boeing Black handset will come with support for BlackBerry's BES 12 device management service. It's not much of a stretch to assume the Boeing Black might also feature BlackBerry's hallmark secure messaging system.

Read more

Old FOSS Friend & Foe Represents Sony in Hack

Filed under
Microsoft
Security
Legal

Boies, along with three attorneys representing the States, brought Microsoft to it’s knees — or so it seemed at the time.

On November 5, 1999, Judge Thomas Penfield Jackson found that Windows dominance on the PC made the company a monopoly and that the company had taken illegal actions against Apple, Java, Netscape, Lotus Notes, RealNetworks, Linux, and others in order to maintain that monopoly. He ordered Microsoft broken in two, with one company producing Windows and another handling all other Microsoft software.

As we all know, Judge Jackson’s solution was never implemented.

Although an appeals court upheld the verdict against Redmond, the breakup of the company was overturned and sent back to the lower court for a review by a new judge. Two years later, in September, 2001, under the Bush Administration, the DOJ announced that it was no longer seeking the breakup of Microsoft, and in November reached a settlement which California, Connecticut, Iowa, Florida, Kansas, Minnesota, Utah, Virginia and Massachusetts opposed.

The settlement basically required Microsoft to share its APIs and appoint a three person panel that would have complete access to Microsoft’s systems, records, and source code for five years. The settlement didn’t require Microsoft to change any code or stop the company from tying additional software with Windows. Additionally, the DOJ did not require Microsoft to change any of its code.

Read more

You should be running a pfSense firewall

Filed under
Security
BSD

Those of us who work in the depths of high technology are not immune to the age-old adage of the shoemaker’s children having no shoes. We probably have the most technologically advanced homes of anyone we know, but we also tend to leave various items alone if they’re not causing problems. After all, that’s what we deal with at work. Who needs to saddle themselves with network upgrade projects at home when nothing’s broken?

Read more

Ubuntu 14.10 (Utopic Unicorn) Gets Linux Kernel Regression Fix

Filed under
Security
Ubuntu

A Linux kernel regression for Ubuntu 14.10 (Utopic Unicorn) has been identified by Canonical and the developers have issued a patch that should be available through regular channels.

Read more

The Grinch That Tried to Exploit Linux

Filed under
Linux
Security

The Grinch flaw was reported by Stephen Cody, chief security evangelist at Alert Logic. Cody alleges that the Grinch flaw enables users on a local machine to escalate privileges. Leading Linux vendor Red Hat, however, disagrees that the Grinch issue is even a bug and instead notes in a Red Hat knowledge base article that the Grinch report "incorrectly classifies expected behavior as a security issue."

Read more

Git 2.2.1 Released To Fix Critical Security Issue

Filed under
Development
OSS
Security

Today's Git vulnerability affects those using the Git client on case-insensitive file-systems. On case-insensitive platforms like Windows and OS X, committing to .Git/config could overwrite the user's .git/config and could lead to arbitrary code execution. Fortunately with most Phoronix readers out there running Linux, this isn't an issue thanks to case-sensitive file-systems.

Read more

How Linux containers can solve a problem for defense virtualization

Filed under
GNU
Linux
Security

As the virtualization of U.S. defense agencies commences, the technology’s many attributes—and drawbacks—are becoming apparent.

Virtualization has enabled users to pack more computing power in a smaller space than ever before. It has also created an abstraction layer between the operating system and hardware, which gives users choice, flexibility, vendor competition and best value for their requirements. But there is a price to be paid in the form of expensive and cumbersome equipment, software licensing and acquisition fees, and long install times and patch cycles.

Read more

Syndicate content

More in Tux Machines

babyliss curl secret in the whitney museum area

Cybercriminals are quite interested in YouTube, but they don't want to share good content. On the ground, he learned the Chinook in front of him "had almost been blown out of the sky"; he showed a photo of it with a gash from a rocket propelled grenade.. In many respects, the 911 Turbo developed into the car the 928S would probably have become; a savagely powerful, hugely capable but ultimately rather refined sports/GT weapon.Launched in 2000 in 420bhp coupe form, the Turbo was an instant hit and made many more expensive rivals suddenly look rather silly. Fatshionista: SALES POST: bubble dress and tops, Torrid, Alfani SALES POST: bubble dress and tops, Torrid, Alfani, INC, Baby Phat, sizes 14 18 and 0X 1X. I live in a field. According to arrest reports, on several occasions McCray would have friends come into the store and select items for purchase. Tirana, Albania Get in quick before everyone else does "You'll see wedding dress shops everywhere. The patterns through olden dealing mulberry bags outletbring more retro styles to the classic design, which make the pieces more vogue and elegant. Several viewers from the Bay Area tell us they been getting calls about having won the lottery. In fact, hobo designer leather handbags happen to be top fashion today. Should magenta is normally utilized using the stormy glimpse, it again makes an ideal phenomena connected with fashion. The stripe story was cute longline tops, cardigans and one intriguing hooded singlet dress with babyliss pro perfect curl cutout panels as were the denim overalls.. Most of the time when a man wears a jockstrap he will be wearing a cup with it. Fresh produce accounts for about 30 percent of Wal Mart's sales in its wholesale outlets in India.Wal Mart must buy in small batches from small plot holders in a country where more than 80 percent of farms are under 2 hectares. Up to 4 players can participate in an online race and can race in 4 game modes including circuit, sprint, lap knockout and speed trap. Booties with gold chain tassel trim. If you consider you're brilliant adequate to carry on into it then you could be the first getting babyliss perfect curl it on the shops. And you know but at the very least even have Time Warner Cable to wanna turn the tables what this can try and show you who's. Simple night sky exploration: the moon looks pretty coolcloseupWith all that said, the Optic 1050 is hollister hoodies a pretty well built viewing device. Another significant group consists of those that travel abroad extensively, and need to babyliss miracurl be capable of switch to carriers based within the countries they go to. Dr chen who had been to the Dr Oz exhibit stated that the good fresh fruit not merely suppresses desire to have ingredients and function as a fat blocker but she likewise stated that the Garcinia Cambogia improves muscles and decreases fat.

Calligra 2.9 Brings Biggest Krita Release and New Kexi Partnership

We are happy to announce the release of final version 2.9 of the Calligra Suite, Calligra Active and the Calligra Office Engine. This version is the result of thousands of changes which provide new features, polishing of the user experience and bug fixes. More

Meizu MX4 Ubuntu Edition Is Official, Will Be at MWC In March

No longer a rumour but fact: Meizu has confirmed the news on its social media accounts this morning, just as the latest flash sale for the Bq Ubuntu Phone was getting underway. Read more

Telegram Desktop for Linux Review

Telegram is an instant messaging service that is best known for its mobile implementation, but a desktop app is also available and it's even better than what users might expect. Read more