linuxjournal.com: Although my intent is not to start the next GNOME/KDE-level war, it seems there must be a happy medium between total desktop insecurity and total desktop unusability.
jeffhoogland.blogspot: Many Linux Advocates, myself included, assert that our operating system of choice is more than ready for the "general public" or "average user". In recent years it seems the term "user friendliness" has become associated with the exact opposite of what I love about Linux:
toolbox.com/blogs: While there is no excuse for inattention and lack of knowledge, the fact is that there are Linux virus's (viruses, virii?) and there will be more.
toolbox.com/blog: The alarm has rung several times before and each time the snooze button was pressed. This time, just recently, the alarm has rung with yet another compromised download resulting in another Linux trojan back door. The time has come for us to stop hitting that snooze button.
itworld.com: There have been several stories proclaiming that a recent Linux infection proves Windows malware monopoly is over and that Think Linux is free from malware? Think again; it's been hacked. Much as it pains me to disagree with the good people, they're wrong.
blogs.techrepublic.com: Protecting a networked computer is a never-ending challenge — even in Linux. These simple measures will help protect your Linux box.
- Linux infection proves Windows malware monopoly is over
- "Is Linux Secure?" at Southeast LinuxFest
tcs-security-blanket.blogspot: BROKEN LINKS in Linux file systems are not just annoying — they can also be a security risk. In a previous post, I discussed the potential dangers of unowned files and in this post I will talk about those annoying, resource consuming broken links usually considered simple file system “lint”.
computerworlduk.com: Who's got the safest operating system? Apple, Google, Microsoft? According to one security expert, what really matters is who's using the OS.
links.org: Nigori is a protocol for storing secrets in the cloud such that the storage need not be trusted and only a single password is required to access secrets.