security

0

SSL Certificates Vulnerable to OpenSSL Flaw on Debian

http://news.netcraft.com

Netcraft's June SSL Survey has found that a significant number of SSL certificates are affected by the Debian OpenSSL vulnerability, including Extended Validation SSL certificates and certificates belonging to banks.

Read more »
missgeek's picture
Created by missgeek 15 years 44 weeks ago – Made popular 15 years 44 weeks ago
Category: Industry   Tags:
0

Wiping your disk drive clean

http://www.linux.com

Everybody who owns a computer will someday need to dispose of a disk drive. Before you do, it is a good idea to cleanse the drive, so no one can read your sensitive information. Deleting files and reformatting is not sufficient; determined effort can still reveal data from a drive even after it appears to be gone.

Read more »
missgeek's picture
Created by missgeek 15 years 47 weeks ago – Made popular 15 years 47 weeks ago
Category: End User   Tags:
0

Updating Debian keys for the uninterested

http://www.freesoftwaremagazine.com

Despite having an aversion to configuring and maintaining security and crypto software, I accepted that I had to update my system in response to the recent big Debian security problem. If I can do it, you can do it. Below are my notes, but keep in mind that my security rank is somewhere between ignorant and uninterested.

Read more »
tony's picture
Created by tony 15 years 48 weeks ago – Made popular 15 years 48 weeks ago
Category: High End   Tags:
0

Installing mod_python and Django on Apache

http://fosswire.com

I’ve recently started learning Django for doing web development, so as part of that, I needed to also learn how to set up Django within mod_python so I could deploy my new Django applications on my server.

Read more »
serdar's picture
Created by serdar 15 years 48 weeks ago – Made popular 15 years 48 weeks ago
Category: High End   Tags:
0

Ubuntu Security Notice another win for Linux.

http://dthomasdigital.wordpress.com

What is that I say, a win for Linux? Look now that all the nay-sayers, pundits, and critics have had a chance to chime in lets look at the big picture. The openssh vulnerability is not something to take lightly and I’m not it’s just I think allot of noise was made for something I think was handled much better than any Microsoft vulnerability ever has.

Read more »
MBP2000's picture
Created by MBP2000 15 years 48 weeks ago – Made popular 15 years 48 weeks ago
Category: Community   Tags:
0

Encrypted Root LVM

http://www.howtoforge.com

This tutorial deals only with how to add an extra encrypted physical volume to a volume group pool containing other encrypted physical volumes. This is typical scenario if, at first, you have set up your encryption at a physical partition level (/dev/sdaX where X is the a number of your partition), then you setup your LVM on top of the encrypted partition.

Read more »
lucioalbenga's picture
Created by lucioalbenga 15 years 49 weeks ago – Made popular 15 years 49 weeks ago
Category: High End   Tags:
0

Public Service Announcement to Debian and Ubuntu Users

http://brian.mastenbrook.net

"... «A weakness has been discovered in the random number generator used by OpenSSL on Debian and Ubuntu systems. As a result of this weakness, certain encryption keys are much more common than they should be, such that an attacker could guess the key through a brute-force attack given minimal knowledge of the system.

Read more »
can.axis's picture
Created by can.axis 15 years 49 weeks ago – Made popular 15 years 49 weeks ago
Category: Community   Tags:
0

Secure the Hell Out of Your Linux Desktop/Server

http://tuxtraining.com

Are you paranoid about script kiddies? Crackers? The government? Competing business? Well here's a comprehensive list of howto's and explainers to secure the living hell out of your Linux desktop. Follow this perfectly, and the chances of your system being compromised severely drops

Read more »
devnull's picture
Created by devnull 15 years 50 weeks ago – Made popular 15 years 50 weeks ago
Category: End User   Tags:
0

Study: 70 percent say Red Hat more secure than Windows

http://arstechnica.com

The Standish group recently completed an extensive study that examines factors influencing open-source adoption. Based on five years of research and analysis, the report provides intriguing insights into open-source adoption levels and the way that open source is reshaping the software industry.

Read more »
Jimbob's picture
Created by Jimbob 15 years 52 weeks ago – Made popular 15 years 51 weeks ago
Category: Business   Tags:
0

Protecting directory trees with gpgdir

http://www.linux.com

gpgdir uses GNU Privacy Guard (GnuPG) to encrypt and decrypt files or a directory tree. You could accomplish the same objective by tarring the filesystem up and then encrypting the tar.gz file with GnuPG, but then you would still have to shred or wipe every file in the original directory tree. With gpgdir the whole tree is encrypted in one command.

Read more »
lucioalbenga's picture
Created by lucioalbenga 16 years 1 day ago – Made popular 16 years 14 hours ago
Category: High End   Tags:
0

Introduction to Forensics

http://www.linuxjournal.com

There are certain aspects to system administration that you can learn only from experience. Computer forensics (among other things the ability to piece together clues from a system to determine how an intruder broke in) can take years or even decades to master. If you have never conducted a forensics analysis on a computer, you might not even know exactly where to start.

Read more »
lucioalbenga's picture
Created by lucioalbenga 16 years 3 days ago – Made popular 16 years 2 days ago
Category: High End   Tags:
0

NSA Guides for Securing Red Hat Enterprise Linux 5

http://tuxtraining.com

These are some decent guides for securing your Red Hat Linux 5 system provided by the US Government’s NSA. Enjoy

Read more »
devnull's picture
Created by devnull 16 years 1 week ago – Made popular 16 years 1 week ago
Category: End User   Tags:
0

With Vista Breached, Linux Unbeaten in Hacking Contest

http://www.cio.com

The MacBook Air went first; a tiny Fujitsu laptop running Vista was hacked on the last day of the contest; but it was Linux, running on a Sony Vaio, that remained undefeated as conference organizers ended a three-way computer hacking challenge Friday at the CanSecWest conference. Article and video.

Read more »
estherschindler's picture
Created by estherschindler 16 years 3 weeks ago – Made popular 16 years 3 weeks ago
Category: Industry   Tags:
0

Results of the PWN to OWN Competition

http://www.teenlinuxlounge.com

You may or may not have heard of it, but the PWN to OWN Competition is an annual competition where hackers get together to try to hack into 3 different machines: a Mac, a Linux box, and a Vista box. So far, the results have been both surprising and unsurprising as well.

Read more »
Mr. Psychopath's picture
Created by Mr. Psychopath 16 years 3 weeks ago – Made popular 16 years 3 weeks ago
Category: Community   Tags:
0

Customize the Update Manager in Ubuntu

http://www.techthrob.com

One of the great things about using open source software is the frequency with which bugs are fixed, security holes are patched, and new features are added. Ubuntu includes a very convenient update manager but constantly upgrading your system can be a burden. This guide will explain howto customize the manager to run less often, or automatically install updates.

Read more »
nemilar's picture
Created by nemilar 16 years 9 weeks ago – Made popular 16 years 9 weeks ago
Category: Beginner   Tags:

Best karma users