Language Selection

English French German Italian Portuguese Spanish

Security

Unix/Linux rootkits 101

Filed under
Security

techrepublic blogs: The term rootkit originated with a reference to the root user account on Unix systems. Rootkits are not limited to Unix, however, or even to administrative user accounts like the Unix root account. No matter what operating system you use, you should be familiar with good practices for detecting and dealing with the threat of rootkits.

Also: Clamav is great

Alleged critical holes in Xvid

Filed under
Security

heise-security: According to reports from several security services, the Xvid 1.1.2 Video Codec Library has a security hole which attackers could use to gain control over a PC. Both Windows and Linux applications are affected.

Detect insider threats with Linux auditing

Filed under
Security

linux.com: Organizations of all sizes need to mitigate the risk of insider threats. Misconduct by authorized users represents a grave threat to an organization. You can secure your network perimeter with intrusion detection systems, firewalls, and virus scanners, but don't neglect to monitor authorized users. The Linux Audit daemon can help you detect violations of your security policies.

Open source: New target of malware?

Filed under
Security

ZDNet: The recent OpenOffice worm may be a sign that malware writers are starting to target the increasingly popular open-source software, industry experts say.

Linux configure point to point tunneling PPTP VPN client for Microsoft PPTP vpn server

Filed under
Linux
Hardware
Software
Security
BSD
Ubuntu
HowTos

With this tip you will be able to work from home using VPN and that too from Linux / FreeBSD system for the proprietary Microsoft Point-to-Point vpn server.

Introducing Remo - An Easy Way to Secure an Insecure Online Application with ModSecurity

Filed under
Linux
Security
HowTos

Say you have a nasty application on your Apache webserver that has been installed by some people from the marketing department and you can neither remove nor patch it. Maybe it is a time problem, a lack of know-how, a lack of source-code, or possibly even political reasons. Consequently you need to protect it without touching it. There is ModSecurity, but they say this is only for experts. A straightforward alternative is Remo, a graphical rule editor for ModSecurity that comes with a whitelist approach.

OpenOffice worm hits Mac, Linux and Windows

Filed under
Security
OOo

builderau: Malware targeting OpenOffice documents is spreading through multiple operating systems including Mac OS, Windows and Linux, according to Symantec.

Windows vs Linux security report card redux

Filed under
Security

zdnet blogs: Jeff Jones has expanded his project to count security flaws (publicly reported and fixed) in the major workstation operating systems and his latest numbers show Windows Vista has by far the best security profile when compared to the major Linux distributions.

How To Block Spam Before It Enters The Server (Postfix)

Filed under
Linux
Security
HowTos

The last few weeks have seen a dramatic increase in spam (once again). Estimates say that spam makes now up for 80 - 90% of all emails, and many mail servers have difficulties in managing the additional load caused by the latest spam, and spam filters such as SpamAssassin do not recognize large parts of that spam as they did before. Fortunately, we can block a big amount of that spam at the MTA level.

A New Vector For Hackers -- Firefox Add-Ons

Filed under
Security

Washington Post: Makers of some of the most popular extensions, or "add-ons," for Mozilla's Firefox Web browser may have inadvertently introduced security holes that criminals could use to steal sensitive data from millions of users.

Syndicate content

More in Tux Machines

Of course USA loses in cyber war - NSA and friends made sure it would happen

There is a reason why China and others are trying to move away from Windows to Linux and other alternatives, and it is not to avoid sending its hard earned dollars to Cayman Islands (or whatever tax haven Microsoft is using these days to collect the majority of its income. :) Read more

ASF publishes long-overdue Code Of Conduct

We pride ourselves at The Apache Software Foundation on our principles of "community over code" and "don't be a jerk". But, alas, we've been slow to codify some of these things in public. Part of this, I'm sure, is that it’s easy to think we all just know how we're supposed to treat people, and so you shouldn't have to say, right? Read more

Building a Healthy Web to Hand to Future Generations

The Mozilla project is dedicated to tackling these challenges. Our community makes Firefox products that are loved and used the world over, all in service of our mission to protect the Web. We are also hard at work teaching thousands more people how to help build the Web, developing innovative open source technologies for others to leverage, protecting individual privacy and establishing technical standards. Read more

Linus Torvalds Launches Linux Kernel 3.19 RC1, One of the Biggest So Far

The first Linux kernel Release Candidate has been made available in the 3.19 branch and it looks like it's one of the biggest ones so far. Linux Torvalds surprised everyone with an early launch, but it's easy to understand why. Read more