GNU/Linux systems are immune to viruses is anything but myth. Viruses, malware are programs with destructive intentions and can be installed on any machine throgh various means. It becomes extremely easy if an attacker/cracker (not hacker for god's sake, you idiot) gets physical access to the machine. You can install a malicious code on your own computer if you want.Read more »
Firewall Builder is a firewall configuration and management GUI that supports configuring a wide range of firewalls from a single application. Supported firewalls include Linux iptables, BSD pf, Cisco ASA/PIX, Cisco router access lists and many more.Read more »
Unknown attackers penetrated the server hosting the open source ProFTPD FTP server project and concealed a back door in the source code.Read more »
Over the weekend, Savannah was compromised. Here's a chronological account of the events: […]
We are very sorry for the inconvenience caused to Savannah users by this attack, and thank you for your patience while we work to bring back an improved service.
Without any special hardware or reconfiguration, it can capture live data going in and out over any of your box's network interfaces: Ethernet, WiFi, PPP, loopback, even USB.Read more »
The Koobface worm makes the news again with a cross-platform version of the Worm. Security firm Intego disclosed the threat for Mac OS X on their blog. The worm uses a Java applet to download the malicious payload. If the user allows the applet to run, Koobface may be able to join the Botnet. The site I’ve tested in the wild will work for Windows, Linux and OS X.Read more »
Security researchers warn that a new drive-by download attack is capable of infecting Windows, Mac OS X and Linux systems with a new variant of the notorious Koobface worm.Read more »
Designing for surveillance means, more or less by definition, designing a less secure, more vulnerable infrastructure.Read more »
By now, everyone knows that if you want to make a file unrecoverable, you can't simply delete it - you have to use a tool like 'shred' or 'srm' to overwrite its contents. But a common question is whether this is effective on an ext3, ext4, or other journaled filesystems. This article discusses these filesystems, and whether secure deletion tools work on them.Read more »
Linpus Lite 1.4 is the latest update to the Linux distribution published by Linpus Technologies, Inc. of Taipei, Taiwan. Though designed for use on netbooks and low-powered computers, it is one of the best distributions that I have reviewed for publication on this website.
With this article, I present all the physical and network security features available on this distribution.Read more »
Damn Vulnerable Linux – The most vulnerable and exploitable operating system ever! Damn Vulnerable Linux is the most complete training environment for IT security with over 500.000 downloads. It includes all tools you need ready to go. Additionally tons of training material and exercises are included.Read more »
10 Things You Can Do To Make Your Linux Hosted Website More Secure By Corey W. 10. Get cooperation from your Linux host. Make sure your host is updating their software at the server and network levels. This includes any available kernel updates, as well as updates for packages such as Apache and PHP.Read more »
GNU/Linux is patching flaws very quickly (almost immediately), whereas Microsoft hides flaws and patches them a long time after their discovery, sometime patching them secretly or only once attacks strikeRead more »