security

0

Has the NSA "poisoned the well" for responsible disclosure?

https://www.openrightsgroup.org

Revelations about the PRISM project involve US tech companies that have been compelled to provide special assistance to US intelligence agencies. Will secret arrangements between tech companies and US intelligence affect how independent security researchers disclose vulnerabilities?

Read more »
Superbowl H5N1's picture
Created by Superbowl H5N1 8 years 49 weeks ago – Made popular 8 years 49 weeks ago
Category: Philosophy   Tags:
0

Skype with care – Microsoft is reading everything you write

http://www.h-online.com

Anyone who uses Skype has consented to the company reading everything they write. The H's associates in Germany at heise Security have now discovered that the Microsoft subsidiary does in fact make use of this privilege in practice. Shortly after sending HTTPS URLs over the instant messaging service, those URLs receive an unannounced visit from Microsoft HQ in Redmond.

Read more »
liquidat's picture
Created by liquidat 9 years 1 week ago – Made popular 9 years 1 week ago
Category: Opposition   Tags:
0

New Year's Resolution: Full Disk Encryption on Every Computer You Own

https://www.eff.org

It's time all of us made a commitment to this basic data security. With full disk encryption all data is protected by default and prying officials at least have to jump through legal hoops before they can start casually thumbing through all your private data.

Read more »
lozz's picture
Created by lozz 10 years 21 weeks ago – Made popular 10 years 20 weeks ago
Category: Legal   Tags:
0

Does disk encryption really protect your data from unauthorized access?

http://www.linuxbsdos.com

Disk encryption is one of several physical security measures that could be used to protect data on your computer from unauthorized physical access. And it is best configured during installation, not after. But once configured, how effective is it?

Read more »
finid's picture
Created by finid 10 years 24 weeks ago – Made popular 10 years 24 weeks ago
Category: Beginner   Tags:
0

Stop the Internet Blacklist Legislation

https://wfc2.wiredforchange.com

As drafted, the legislation would grant the government and private parties unprecedented power to interfere with the Internet's domain name system (DNS). The government would be able to force ISPs and search engines to redirect or dump users' attempts to reach certain websites' URLs.

Read more »
lozz's picture
Created by lozz 10 years 27 weeks ago – Made popular 10 years 27 weeks ago
Category: Legal   Tags:
0

PHP-FPM/Nginx Security In Shared Hosting Environments (Debian/Ubuntu)

http://www.howtoforge.com

If you want to use nginx and PHP-FPM for shared hosting environments, you should make up your mind about security. In Apache/PHP environments, you can use suExec and/or suPHP to make PHP execute under individual user accounts instead of a system user like www-data.

Read more »
falko's picture
Created by falko 10 years 35 weeks ago – Made popular 10 years 35 weeks ago
Category: End User   Tags:
0

Get Professional Security Testing with BackTrack

http://olex.openlogic.com

Penetration testing involves deliberately attacking your system to determine vulnerabilities. Using a variety of tools designed for specific tasks, you attempt to break into your own system. Exhaustive pen testing helps you assess potential breach points, which you should then plug before anyone attempts to exploit them.

Read more »
geekyBodhi's picture
Created by geekyBodhi 10 years 35 weeks ago – Made popular 10 years 35 weeks ago
Category: High End   Tags:
0

Critics label cybercrime bill 'invasion of privacy'

http://www.smh.com.au

Draconian Australian Cybercrime Bill would allow the Attorney General to hand over Australian data to US security services on request, with no subsequent oversight on how long that data might be retained, or how it might be used.

Read more »
lozz's picture
Created by lozz 10 years 40 weeks ago – Made popular 10 years 40 weeks ago
Category: Legal   Tags:
0

Kaspersky study finds Adobe software is biggest security risk

http://www.h-online.com

Before casually clicking on that "Install Adobe Flash Player/Reader" button, think twice. Then don't do it! You'll be inviting every cracker and his dog to invade your network.

Read more »
lozz's picture
Created by lozz 10 years 40 weeks ago – Made popular 10 years 40 weeks ago
Category: Beginner   Tags:
0

Encrypt Early, Encrypt Often!

http://drdobbs.com

Even if you have done nothing wrong, the government agencies examining your files have no contractual obligation to you to keep them safe, nor even to get rid of all their copies once they've determined you're not guilty or that they pulled the wrong party's data.

Read more »
lozz's picture
Created by lozz 10 years 41 weeks ago – Made popular 10 years 41 weeks ago
Category: Legal   Tags:
0

Google also passes on European data to US authorities

http://www.h-online.com

More solid reasons for leaving the cloud to the birds. With varying international laws, almost anyone can end up examining your private data. Security and privacy are never guaranteed.

Read more »
lozz's picture
Created by lozz 10 years 41 weeks ago – Made popular 10 years 41 weeks ago
Category: Legal   Tags:
0

Encrypt the Web with HTTPS Everywhere

https://www.eff.org

The Electronic Frontier Foundation (EFF), in collaboration with the Tor Project, has launched an official 1.0 version of HTTPS Everywhere, a tool for the Firefox web browser that helps secure web browsing by encrypting connections to more than 1,000 websites.

Read more »
lozz's picture
Created by lozz 10 years 42 weeks ago – Made popular 10 years 42 weeks ago
Category: End User   Tags:
0

Lightweight Portable Security (LPS)-A Linux distro from the US Department of Defense

http://www.unixmen.com

Lightweight Portable Security (LPS), created by USA's Department of Defence, is a small Linux live CD focusing on privacy and security, for this reason, it boots from a CD and executes from RAM, providing a web browser, a file manager and some interesing tools. LPS-Public turns an untrusted system into a trusted network client.

Read more »
linuxadmiral's picture
Created by linuxadmiral 10 years 44 weeks ago – Made popular 10 years 44 weeks ago
Category: End User   Tags:
0

10 Ultimate commands to generate randoms passwords on your terminal

http://theopenhelp.com

One of the things I love in Linux is that we can do a simple thing 100 different ways in it, like creating random passwords..

Read more »
gokulvarma's picture
Created by gokulvarma 11 years 11 weeks ago – Made popular 11 years 11 weeks ago
Category: Beginner   Tags:
0

Linux for mobile users

http://pcplus.techradar.com

The smart mobile user shouldn’t overlook Linux. The question is, which distro should you pick? You’ll get a different answer depending who you ask.

Read more »
geekyBodhi's picture
Created by geekyBodhi 11 years 15 weeks ago – Made popular 11 years 15 weeks ago
Category: End User   Tags:

Best karma users