Language Selection

English French German Italian Portuguese Spanish

Security

Serious flaw marks end of life for Bind 8 DNS server

Filed under
Software
Security

computerworld: A security researcher has found a serious vulnerability in an aging yet widely used software program used for the Internet's addressing system, prompting the software's maintainers to retire the affected version.

Portable Security for the Practical Paranoid

Filed under
Software
Security

opensourcelearning.info: Recently I have been thinking about my online security. It lead me on a brief search for portable applications which at least give me the feeling that I am more secure that I am now.

Browser betrayals

Filed under
Software
Security

Tux Love (PC World): Most people don't realise how their browsers betray them. It's not so bad at home, but in a work context it could cost you your job.

Also: FileZilla 3 brings Windows FTP goodness to Linux

Skype collects Linux user data too

Filed under
Software
Security

the inquirer: We already reported how Skype was taking a deep interest in the workings of the BIOs of Windows users, now it seems that the outfit is snooping on Linux users too.

Nvidia has Linux security hole

Filed under
Security

the inquirer: AN ADVISORY from a security researcher called Gregory Shikhman points out that Nvidia drivers have a rather gaping hole when installed under Gentoo Linux.

Gentoo Infrastructure Press Release

Filed under
Gentoo
Security

On August 7, 2007, bannedit reported bug 187971 regarding a possible command injection vulnerability within http://packages.gentoo.org. The Infrastructure team verified the vulnerability and the server was immediately taken down to prevent further exploitation and to allow for forensic analysis.

Unix/Linux rootkits 101

Filed under
Security

techrepublic blogs: The term rootkit originated with a reference to the root user account on Unix systems. Rootkits are not limited to Unix, however, or even to administrative user accounts like the Unix root account. No matter what operating system you use, you should be familiar with good practices for detecting and dealing with the threat of rootkits.

Also: Clamav is great

Alleged critical holes in Xvid

Filed under
Security

heise-security: According to reports from several security services, the Xvid 1.1.2 Video Codec Library has a security hole which attackers could use to gain control over a PC. Both Windows and Linux applications are affected.

Detect insider threats with Linux auditing

Filed under
Security

linux.com: Organizations of all sizes need to mitigate the risk of insider threats. Misconduct by authorized users represents a grave threat to an organization. You can secure your network perimeter with intrusion detection systems, firewalls, and virus scanners, but don't neglect to monitor authorized users. The Linux Audit daemon can help you detect violations of your security policies.

Open source: New target of malware?

Filed under
Security

ZDNet: The recent OpenOffice worm may be a sign that malware writers are starting to target the increasingly popular open-source software, industry experts say.

Syndicate content

More in Tux Machines

Leftovers: Gaming

Leftovers: Software

Elementary OS’s Pantheon Desktop May Become Available On Fedora Systems, Starting With Fedora 22

The Fedora developers are thinking at porting Elementary OS’s Pantheon Desktop to Fedora. If this happens, Pantheon will be available via the default repositories of Fedora, starting with Fedora 22, which will be released next year. Read more

Docker in Production — What We’ve Learned Launching Over 300 Million Containers

Earlier this year, we made a decision to run every task on IronWorker inside its own Docker container. Since then, we've run over 300,000,000 programs inside of their own private Docker containers on cloud infrastructure. Now that we’ve been in production for several months, we wanted to take the opportunity to share with the community some of the challenges we faced in running a Docker-based infrastructure, how we overcame them, and why it was worth it. Read more