Language Selection

English French German Italian Portuguese Spanish

Security

Palm accused of 'spying' on Pre owners

Filed under
Hardware
Security

telegraph.co.uk: Palm Pre owner Joey Hess claims to have uncovered code within the phone's operating system which shows that the device is sending back information about his location to Palm.

Dangerous Security Flaw Likely Just a Hoax

Filed under
Security

pcworld.com: A claim of a software vulnerability in a program used to connect securely to servers across the Internet is likely a hoax, according to an analyst with the SANS Internet Storm Center.

Rumours of critical vulnerability in OpenSSH in Red Hat Enterprise Linux

Filed under
Linux
Security

h-online.com: A posting on the Web Hosting Talk forum is feeding speculation about a critical security vulnerability in the OpenSSH server in CentOS/Red Hat Enterprise Linux (RHEL).

SquirrelMail open source project's web server hacked

Filed under
Security
Web

h-online.com: It has just become apparent that, on June 16, attackers hacked into the web server of the SquirrelMail open source project. The operators have suspended all accounts and reset all crucial passwords.

Stop illegal Steganography

Filed under
Security

Some of the more nefarious Steganography tactics include hiding information for illegal reasons. Learn whats at stake and how to detect and thwart Steganography techniques and blunt its effectiveness.

SELinux vs AppArmor vs Grsecurity

Filed under
Linux
Security
HowTos

cyberciti.biz: Linux kernel is the central component of Linux operating systems. It is responsible for managing the system's resources, the communication between hardware and software and security. Unfortunately, stock kernel is not secured out of box. There are some important Linux kernel patches to secure your box. They differ significantly.

Evolution vs sha256, or why my new key is useless

Filed under
Software
Security

ubuntu-nl.org/dennis: There’s one problem though: even when you generate a new gpg key that supports better hashing, your applications will still need to support the better hashing for it to be effective.

They Came a Knockin and Webmin Let Them In

Filed under
Software
Security

thelinuxlink.net: Today was a sad day. I found out my streaming mirror/microblog server had been cracked. They exploited webmin and set up shop. Alas, there is no one to blame but myself. This is how I believe it went down.

10 Steps for Basic Linux Desktop Security

Filed under
Linux
Security
HowTos

linuxsysconfig.com: I agree that Linux is less vulnerable than Windows, but that doesn’t make it immune to attackers. It’s not always about security flaws, buffer overflows or denial of service attacks. I came up with a list of 10 basic rules that should reduce the security risk.

Do you need to worry about the new /dev/mem rootkit problem?

Filed under
Security

blog.ibeentoubuntu.com: A new paper was presented in late March about using /dev/mem to inject and hide a rootkit (PDF), and the method has been getting some press, leading to a little concern.

Syndicate content

More in Tux Machines

The Return of Korora MATE

The Korora Project is very pleased to announce that the final release of the MATE edition of version 21 (codename "Darla") is now available for download in both 32- and 64bit, (we strongly recommend using BitTorrent). Read more

​Linux is an operating system for all ages

Consider James Anderson. He's an 84 year-old volunteer at Free Geek, a Portland, Oregon non-profit organization, which rebuilds old computers for users who need them. As shown in a Linux Foundation video, he works there every Friday to rebuild laptops using Linux that can be sent to Africa. Anderson has been playing with electrical equipment since he blew out his grandmother's fuses and has been using computers since the "luggables" of the 80s. He's never worked in IT, though, until he came to Free Geek. He had spend 13-weeks in Zimbabwe and saw how students there needed computers. Read more