security

warning: Creating default object from empty value in /home/www/drupal/drupal-6.19/modules/taxonomy/taxonomy.pages.inc on line 34.
14

Once Upon A Time, There Was A USB Vulnerability In Linux

http://www.muktware.com

GNU/Linux systems are immune to viruses is anything but myth. Viruses, malware are programs with destructive intentions and can be installed on any machine throgh various means. It becomes extremely easy if an attacker/cracker (not hacker for god's sake, you idiot) gets physical access to the machine. You can install a malicious code on your own computer if you want.

Read more »
akf's picture
Created by akf 3 years 30 weeks ago – Made popular 3 years 30 weeks ago
Category: High End   Tags:
10

How to configure destination NAT with firewall builder

http://theopenhelp.com

Firewall Builder is a firewall configuration and management GUI that supports configuring a wide range of firewalls from a single application. Supported firewalls include Linux iptables, BSD pf, Cisco ASA/PIX, Cisco router access lists and many more.

Read more »
gokulvarma's picture
Created by gokulvarma 3 years 37 weeks ago – Made popular 3 years 36 weeks ago
Category: High End   Tags:
11

How To Expand Usable Storage Space In Ubuntu

http://theopenhelp.com

what happens when your ISP (Internet Service Provider) blocks port 80?

Read more »
gokulvarma's picture
Created by gokulvarma 3 years 37 weeks ago – Made popular 3 years 37 weeks ago
Category: High End   Tags:
12

Back door in ProFTPD FTP server

http://www.h-online.com

Unknown attackers penetrated the server hosting the open source ProFTPD FTP server project and concealed a back door in the source code.

Read more »
lmfao's picture
Created by lmfao 3 years 40 weeks ago – Made popular 3 years 40 weeks ago
Category: Community   Tags:
13

Savannah and www.gnu.org downtime

http://www.fsf.org

Over the weekend, Savannah was compromised. Here's a chronological account of the events: […]
We are very sorry for the inconvenience caused to Savannah users by this attack, and thank you for your patience while we work to bring back an improved service.

Read more »
akf's picture
Created by akf 3 years 40 weeks ago – Made popular 3 years 40 weeks ago
Category: Community   Tags:
15

Weekend Project: Analyze Your Network with Wireshark

http://www.linux.com

Without any special hardware or reconfiguration, it can capture live data going in and out over any of your box's network interfaces: Ethernet, WiFi, PPP, loopback, even USB.

Read more »
lozz's picture
Created by lozz 3 years 44 weeks ago – Made popular 3 years 44 weeks ago
Category: End User   Tags:
15

Koobface: the cross-platform version

http://blogs.paretologic.com

The Koobface worm makes the news again with a cross-platform version of the Worm. Security firm Intego disclosed the threat for Mac OS X on their blog. The worm uses a Java applet to download the malicious payload. If the user allows the applet to run, Koobface may be able to join the Botnet. The site I’ve tested in the wild will work for Windows, Linux and OS X.

Read more »
Linerd's picture
Created by Linerd 3 years 45 weeks ago – Made popular 3 years 45 weeks ago
Category: Community   Tags:
14

New Koobface Variant Infects Linux Systems

http://news.softpedia.com

Security researchers warn that a new drive-by download attack is capable of infecting Windows, Mac OS X and Linux systems with a new variant of the notorious Koobface worm.

Read more »
lozz's picture
Created by lozz 3 years 45 weeks ago – Made popular 3 years 45 weeks ago
Category: End User   Tags:
21

Not Being Able To Spy On Everyone Online Is A Feature, Not A Bug

http://www.techdirt.com

Designing for surveillance means, more or less by definition, designing a less secure, more vulnerable infrastructure.

Read more »
lozz's picture
Created by lozz 3 years 47 weeks ago – Made popular 3 years 47 weeks ago
Category: Legal   Tags:
17

Secure Deletion Tools and Journaled Filesystems: Do they work?

http://techthrob.com

By now, everyone knows that if you want to make a file unrecoverable, you can't simply delete it - you have to use a tool like 'shred' or 'srm' to overwrite its contents. But a common question is whether this is effective on an ext3, ext4, or other journaled filesystems. This article discusses these filesystems, and whether secure deletion tools work on them.

Read more »
nemilar's picture
Created by nemilar 3 years 48 weeks ago – Made popular 3 years 48 weeks ago
Category: High End   Tags:
14

Security features of Linpus Lite 1.4

http://www.linuxbsdos.com

Linpus Lite 1.4 is the latest update to the Linux distribution published by Linpus Technologies, Inc. of Taipei, Taiwan. Though designed for use on netbooks and low-powered computers, it is one of the best distributions that I have reviewed for publication on this website.

With this article, I present all the physical and network security features available on this distribution.

Read more »
finid's picture
Created by finid 3 years 49 weeks ago – Made popular 3 years 49 weeks ago
Category: Beginner   Tags:
19

Damn Vulnerable Linux

http://www.linuxaria.com

Damn Vulnerable Linux – The most vulnerable and exploitable operating system ever! Damn Vulnerable Linux is the most complete training environment for IT security with over 500.000 downloads. It includes all tools you need ready to go. Additionally tons of training material and exercises are included.

Read more »
sunny's picture
Created by sunny 3 years 50 weeks ago – Made popular 3 years 50 weeks ago
Category: High End   Tags:
22

Block crackers with 3 locks to your SSH door

http://www.ibm.com

Learn 3 ways of hardening SSH access to your system to block would-be crackers

Read more »
lmfao's picture
Created by lmfao 3 years 51 weeks ago – Made popular 3 years 51 weeks ago
Category: High End   Tags:
19

10 Things You Can Do To Make Your Linux Hosted Website More Secure

http://securehostingdirectory.com

10 Things You Can Do To Make Your Linux Hosted Website More Secure By Corey W. 10. Get cooperation from your Linux host. Make sure your host is updating their software at the server and network levels. This includes any available kernel updates, as well as updates for packages such as Apache and PHP.

Read more »
stripcut's picture
Created by stripcut 4 years 2 weeks ago – Made popular 4 years 2 weeks ago
Category: High End   Tags:
21

Great New Example of Why GNU/Linux is Inherently More Secure Than Windows

http://techrights.org

GNU/Linux is patching flaws very quickly (almost immediately), whereas Microsoft hides flaws and patches them a long time after their discovery, sometime patching them secretly or only once attacks strike

Read more »
komrad's picture
Created by komrad 4 years 3 weeks ago – Made popular 4 years 3 weeks ago
Category: High End   Tags: