Language Selection

English French German Italian Portuguese Spanish

Security

WebKit security holes haunt Ubuntu

Filed under
Security
Ubuntu

zdnet.com: According to an Ubuntu security alert, the WebKit flaws are dangerous enough to cause arbitrary code execution attacks.

How to secure your data with Truecrypt in 11 easy steps!

Filed under
Security

Truecrypt, is a free and open-source disk encryption software. In this post we will show you how to encrypt all your data using Truecrypt in 11 easy steps. With Truecrypt it is possible to encrypt a virtual disk (folder), a partition or a whole storage device. The two most beautiful things with Truecrypt are real-time instantaneous encryption and simple and easy setup.

http://ubuntumanual.org/posts/364/secure-your-data-with-truecrypt-in-11-easy-steps

Don't download the wrong VLC

Filed under
Software
Security

drbill.cc: I love VLC. It is one of the programs I install on all my systems, whether Windows, or Linux. BUT, some evil, nasty dewds are making the good name of VLC a “hook” to get you to download a modified mailware infested version! Grrrr!

7 Most Notorious Computer Hacker Groups of All Time

Filed under
Security

junauza.com: Hackers and hacker groups were quite famous in the 80’s and 90’s but their popularity started fading since the Y2K days. Today, we are once again witnessing hackers threatening to take on giant corporations sending chills down everyone's spine.

Security of GNU/Linux Systems

Filed under
Linux
Security

mrpogson.com: I was surprised to see Brazil in the list of systems compromised by “Anonymous” recently. To demonstrate the compromise, /etc/passwd from some systems was published.

Dropbox 'deceived' users over security: Files are open to government searches

Filed under
Security

zdnet.com: Dropbox ‘deceived’ users about the security and encryption of its cloud storage services, according to a complaint made to the FTC.

Re: Botnets exploit Linux owners' ignorance

Filed under
Linux
Security

dedoimedo.com: After Flaming retort, I have another rebuttal. Another piece of scaremongering, with overhyped drama and sensationalism, wrapped in tech lingo to make the crowds shudder with fear and reverence. Today, I want to talk to you about a short article called Botnets exploit Linux owners' ignorance.

Tiny Core Fraud on Source Forge

Filed under
Linux
Security
Web

jeffhoogland.blogspot: If you watch new projects that are added to source forge then two weeks ago you might have noticed that Tiny Core Linux was added to their projects. I thought this was a little bit odd.

Pwn2Own: Chrome, Android, Firefox own; Safari, IE8, iOS, BB get pwned

Filed under
Software
Security

afterdawn.com: Two days into the Pwn2Own hacking challenge, only a few still remain. So far, hackers have not been able to exploit Mozilla Firefox 3.6, Google Chrome, and the mobile Android OS.

Why Pwn2Own doesn't target Linux

Filed under
Linux
Security

internetnews.com: The annual Pwn2Own hacking challenge kicks off today, pitting security researchers against web browsers and mobile platforms. The HP TippingPoint sponsored event grows every year to include more platforms, though Linux isn't among them.

Syndicate content

More in Tux Machines

Fedora News, Red Hat's Shares

Android Leftovers

Leftovers: Software

today's howtos