Language Selection

English French German Italian Portuguese Spanish

Security

DOCKER 1.3: SIGNED IMAGES, PROCESS INJECTION, SECURITY OPTIONS, MAC SHARED DIRECTORIES

Filed under
Linux
Server
Security

First up, in this release, the Docker Engine will now automatically verify the provenance and integrity of all Official Repos using digital signatures. Official Repos are Docker images curated and optimized by the Docker community to be the best building blocks for assembling distributed applications. A valid signature provides an added level of trust by indicating that the Official Repo image has not been tampered with.

Read more

What you need to know about the SSLv3 “POODLE” flaw (CVE-2014-3566)

Filed under
Red Hat
Security

So, the bottom line is: on servers and clients, disable SSLv3 (and, of course, older). Updates to Fedora packages which make this the default will be forthcoming, but in the meantime, you can do it manually. Red Hat is working on a security blog article explaining the steps to take for different software; we’ll link to that when it becomes available.

Read more

South Korea Faces The Bill For Lock-in To Wintel

Filed under
Microsoft
Security

I expect Korea will have to redo everything and get it right this time. Let’s hope they demand GNU/Linux be used for on-line/financial transactions and to protect data but failing that let’s hope they make GNU/Linux optional and the people can decide. There’s something refreshing about a whole country aroused about insecurity with that other OS on the check-list of things to fix.

Read more

7 free tools every network needs

Filed under
OSS
Security

From device discovery to visibility into systems, networks, and traffic flows, these free open source monitoring tools have you covered

Read more

With This Tiny Box, You Can Anonymize Everything You Do Online

Filed under
OSS
Security

No tool in existence protects your anonymity on the Web better than the software Tor, which encrypts Internet traffic and bounces it through random computers around the world. But for guarding anything other than Web browsing, Tor has required a mixture of finicky technical setup and software tweaks. Now routing all your traffic through Tor may be as simple as putting a portable hardware condom on your ethernet cable.

Read more

SEANux – a version of Linux from the Syrian Electronic Army

Filed under
GNU
Linux
Security

For now, consider me skeptical of SEANux. After all, back in early 2012 the so-called AnonymousOS was released, a purported new operating system from the Anonymous collective – only to reportedly be found ridden with trojan horses.

Read more

Free Linux-Based Firewall Smoothwall Express 3.1 Is One of the Biggest Releases in Years

Filed under
GNU
Linux
Security

Smoothwall Express is a free firewall that is based on a GNU/Linux kernel that comes with an easy to use interface. The latest version available is now 3.1 and its been in the works for a long time.

Read more

BlackPhone Reviewed: Secure OS Inside a Generic Design and Not Quite Cheap

Filed under
Android
Security

“If privacy is important to you, the Blackphone is almost certainly what you’re after in a mobile device. Besides, you don’t have much choice currently. One thing I’m still coming to terms with, however, is the concept of selling peace of mind.

As Edward Snowden continues to leak information about how the NSA and other national government agencies were/are hoovering up every bit of personal data available to them, digital privacy has never been a hotter topic. With people wanting more control over how their data is handled, it was inevitable that products like the Blackphone would appear.”

Read more

Tails OS Will Keep You Anonymous Online and Offline

Filed under
Security
Debian

There are many Linux distributions available right now that claim to protect the privacy of their users, but very few actually do it properly. Tails is definitively among the top ones, if not the best. Now, a new version has been made available, but it's just an RC for an upcoming release...

Read more

Adobe Digital Editions 4 Spies on Users - Because of DRM

Filed under
Security

This column has written many times about the deep flaws of Digital Rights Management (DRM) - or "Digital Restrictions Management" as Richard Stallman rightly calls it - and the ridiculous laws that have been passed to "protect" it. What these effectively do is place copyright above basic rights - not just in the realm of copyright, but even in areas like privacy. Yesterday, another example of the folly of using DRM'd products came to light.

Read more

Syndicate content

More in Tux Machines

Leftovers: Gaming

Must Have Android Apps That Aren’t So Well Known

There are must have Android apps that everyone has – the big apps that get all the buzz. There are also apps that win popularity contests in specific groups of people. But there are also Android apps worthy of download that aren’t that well known. Think of them as the “must have” underdog list. To avoid missing out on what may prove to be your most helpful app ever, take a look at these lesser known contenders: Read more

Of course USA loses in cyber war - NSA and friends made sure it would happen

There is a reason why China and others are trying to move away from Windows to Linux and other alternatives, and it is not to avoid sending its hard earned dollars to Cayman Islands (or whatever tax haven Microsoft is using these days to collect the majority of its income. :) Read more

ASF publishes long-overdue Code Of Conduct

We pride ourselves at The Apache Software Foundation on our principles of "community over code" and "don't be a jerk". But, alas, we've been slow to codify some of these things in public. Part of this, I'm sure, is that it’s easy to think we all just know how we're supposed to treat people, and so you shouldn't have to say, right? Read more