Security
Security and FUD
Submitted by Roy Schestowitz on Wednesday 27th of January 2021 09:57:50 PM Filed under
-
Security updates for Wednesday
Security updates have been issued by Arch Linux (sudo), CentOS (sudo), Debian (sudo), Fedora (kernel, php-pear, and sudo), Gentoo (cacti, mutt, and sudo), Mageia (sudo), openSUSE (sudo), Oracle (sudo), Red Hat (sudo), Scientific Linux (sudo), Slackware (sudo), SUSE (go1.14, go1.15, nodejs8, and sudo), and Ubuntu (libsndfile and sudo).
-
Mimecast admits certificate compromise tied to SolarWinds supply chain attack
Email security firm Mimecast has admitted that the compromise of a certificate it had issued for some Microsoft services is connected to the SolarWinds supply chain incident.
-
SolarWinds Cyberattack: Layered OT Security Creates Best Defense
The recent SolarWinds supply chain cyberattacks serve to underscore an age-old cybersecurity tenant, and the reason we need to continue beating the drum as cybersecurity professionals: Use a layered approach to OT security.
This incident highlights a rare, specific use case of a nation state threat actor, an Advanced Persistent Threat (APT). In this particular case, layers provided somewhat limited value, but helped keep the less skilled attackers – about 99% of those on the playing field – at bay.
Technology boundaries can be used to lessen the impact of (but unfortunately not prevent) nation state APTs. They not only offer additional protection, they may also help expose the presence of APTs in your network. Let’s examine how they would have helped in the case of APTs like the Sunburst malware that infected SolarWinds Orion software and was downloaded by 18,000 organizations.
-
Linux malware uses open-source tool to evade detection [Ed: How pro-Microsoft propaganda sites blame for a tool which comes from Microsoft (GitHub) "Open Source" and "Linux" (though it is the fault of neither). Alternative headline: Microsoft malware is being used to attack machines that run GNU/Linux]
This tool is known as libprocesshider and is an open-source tool available on Github that can be used to hide any Linux process with the help of the ld preloader.
- Login or register to post comments
Printer-friendly version
- Read more
- 403 reads
PDF version
Security, Internet and Containers
Submitted by Roy Schestowitz on Wednesday 27th of January 2021 12:12:05 AM Filed under
-
Security updates for Tuesday
Security updates have been issued by CentOS (dnsmasq, net-snmp, and xstream), Debian (mutt), Gentoo (cfitsio, f2fs-tools, freeradius, libvirt, mutt, ncurses, openjpeg, PEAR-Archive_Tar, and qtwebengine), openSUSE (chromium, mutt, stunnel, and virtualbox), Red Hat (cryptsetup, gnome-settings-daemon, and net-snmp), Scientific Linux (xstream), SUSE (postgresql, postgresql12, postgresql13 and rubygem-nokogiri), and Ubuntu (mutt).
-
WordPress security & hardening, the definitive guide
WordPress is massively popular. Around every one in five sites on the Internet uses WordPress in some form. Be that to run a humble blog, or a multi-site Content Management System (CMS) or eCommerce site. As a result, it is no surprise that WordPress websites are a very popular target for both experienced hackers and script-kiddies alike.
The last thing any webmaster wants is to find out that their website has been hacked; maybe taken hostage and is part of a botnet, spreading malware, or partaking in Denial of Service (DoS) attacks. In this article we’ll be sharing a number of tips and strategies to help you harden your WordPress website.
-
The Mozilla Blog: Why getting voting right is hard, Part V: DREs (spoiler: they’re bad)
This is the fifth post in my series on voting systems (catch up on parts I, II, III and IV), focusing on computerized voting machines. The technical term for these is Direct Recording Electronic (DRE) voting systems, but in practice what this means is that you vote on some kind of computer, typically using a touch screen interface. As with precinct-count optical scan, the machine produces a total count, typically recorded on a memory card, printed out on a paper receipt-like tape, or both. These can be sent back to election headquarters, together with the ballots, where they are aggregated.
-
Jessica Rosenworcel’s appointment is good for the internet
With a new year comes change, and one change we’re glad to see in 2021 is new leadership at the Federal Communications Commission (FCC). On Thursday, Jan. 21, Jessica Rosenworcel, a longtime FCC commissioner, was appointed as acting chair. It’s an important role that will drive policy discussions affecting the internet and all of us who use it. Her appointment gives us hope that under her wing, the agency will develop strong policies that look out for everyday people. Here are a few reasons Jessica Rosenworcel’s appointment is good for the internet.
[...]
We look forward to working with the FCC to reinstate net neutrality protections and close the digital divide. Jessica Rosenworcel’s ascent to acting chair of the FCC bodes well for the future of both issues. And we can imagine a brighter future for a healthy internet if she were to be nominated for the role permanently.
-
Compute confidently at the Edge with Rancher and Longhorn 1.1 | SUSE Communities
Today’s announcement of Longhorn 1.1, a Cloud Native Computing Foundation (CNCF) Sandbox project, is exciting news for users of Rancher, SUSE’s Kubernetes management platform and the Kubernetes community. Longhorn is an enterprise-grade, cloud native container storage solution that went GA in June 2020. Since then, adoption has increased by 235 percent. Now Longhorn is the first cloud native storage solution designed and built for the edge, with ARM64 support, new self-healing capabilities and increased performance visibility.
-
Longhorn 1.1 Offers ‘ReadWriteMany’ Support Across Containers
SUSE has announced the release of Longhorn 1.1 which allows DevOps teams to manage persistent data volumes in any Kubernetes environment while bringing an enterprise-grade but vendor neutral approach to cloud-native storage.
- Login or register to post comments
Printer-friendly version
- Read more
- 1269 reads
PDF version
Another Sudo Root Privilege Escalation Vulnerability Got Patched, Update Now
Submitted by Marius Nestor on Tuesday 26th of January 2021 08:00:51 PM Filed under
Sudo 1.9.5p2 was released today and it addresses two security issues. The first, CVE-2021-3156 (a.k.a. Baron Samedit), was discovered by Qualys Research Labs and could allow local users (sudoers and non-sudoers) to obtain unintended access to the root (system administrator) account.
In addition, the new release patches CVE-2021-23239, a vulnerability discovered in Sudo’s sudoedit utility, which could allow a local attacker to bypass file permissions and determine if a directory exists or not. This security flaw affected Sudo versions before 1.9.5.
- 5 comments
Printer-friendly version
- Read more
- 1429 reads
PDF version
Security Leftovers
Submitted by Roy Schestowitz on Monday 25th of January 2021 09:51:40 PM Filed under
-
Security updates for Monday
Security updates have been issued by Debian (crmsh, debian-security-support, flatpak, gst-plugins-bad1.0, openvswitch, python-bottle, salt, tomcat9, and vlc), Fedora (chromium, python-pillow, sddm, and xen), Gentoo (chromium, dnsmasq, flatpak, glibc, kdeconnect, openjdk, python, thunderbird, virtualbox, and wireshark), Mageia (blosc, crmsh, glibc, perl-DBI, php-oojs-oojs-ui, python-pip, python-urllib3, and undertow), openSUSE (gdk-pixbuf, hawk2, ImageMagick, opera, python-autobahn, viewvc, wavpack, and xstream), Red Hat (dnsmasq), Slackware (seamonkey), SUSE (hawk2, ImageMagick, mutt, permissions, and stunnel), and Ubuntu (pound).
-
Apache Software Foundation Security Report: 2020
Synopsis: This report explores the state of security across all Apache Software Foundation projects for the calendar year 2020. We review key metrics, specific vulnerabilities, and the most common ways users of ASF projects were affected by security issues.
-
Apache Software Foundation Saw Assigned CVEs Up 24%, Security Issues Up 53% For 2020
The Apache Software Foundation that oversees 340+ Apache projects saw a measurable rise in security related issues during the course of 2020.
-
This new botnet is targeting Linux servers running enterprise apps [Ed: TechRadar foolishly perpetuating ZDNet garbage]
- 1 comment
Printer-friendly version
- Read more
- 1053 reads
PDF version
Proprietary Software, Insecurity and DRM
Submitted by Roy Schestowitz on Monday 25th of January 2021 04:59:02 PM Filed under
-
Microsoft and SAP Extend Partnership
Microsoft and SAP have announced an extension of their existing partnership, one that will see Microsoft Teams integrated into SAP’s suite of products.
-
PoC exploit available for SAP Solution Manager flaw
A serious vulnerability in SAP Solution Manager would allow an attacker can authenticate to vulnerable systems by simply trying to connect, a local researcher has warned, adding that a proof-of-concept exploit is circulating.
-
Ransomware Attackers Publish 4K Private Scottish Gov Agency Files
On the heels of a ransomware attack against the Scottish Environmental Protection Agency (SEPA), attackers have now reportedly published more than 4,000 files stolen from the agency – including contracts and strategy documents.
After hitting SEPA on Christmas Eve with the attack, cybercriminals encrypted 1.2GB of information. The attack has affected SEPA’s email systems, which remain offline as of Thursday, according to the agency. However, SEPA, which Scotland’s environmental regulator, stressed on Thursday that it will not “engage” with the cybercriminals.
-
Discord-Stealing Malware Invades npm Packages
The CursedGrabber Discord malware family, discovered in November, targets Windows hosts. It contains two .exe files which are invoked and executed via ‘postinstall’ scripts from the manifest file, ‘package.json’. One of the .exe files scans user profiles from multiple web browsers along with Discord leveldb files, steals Discord tokens, steals credit-card information, and sends user data via a webhook to the attacker. The second unpacks additional code with multiple capabilities, including privilege escalation, keylogging, taking screenshots, planting backdoors, accessing webcams and so on.
In the case of the three npm packages, these “contain variations of Discord token-stealing code from the Discord malware discovered by Sonatype on numerous occasions,” said Sonatype security researcher Ax Sharma, in a Friday blog posting.
-
DreamBus botnet targets enterprise apps running on Linux servers [Ed: Fear, Uncertainty, Doubt (FUD) site ZDNet continues to blame on "Linux" unpatched software that has nothing to do with Linux (and is being neglected, not patched by the system's maintainers)]
-
ESPN Plus apologizes for ‘technical issue’ during UFC pay-per-view event [Ed: Digital Restrictions (DRM) at work]
A spokesperson for Disney, which owns ESPN, said in an email to The Verge on Sunday that the company was “aware that a technical issue prevented a portion of users from accessing the early part of the ESPN+ pay-per-view event, and we apologize for that experience. We worked as quickly as possible to identify and resolve the issue.”
- Login or register to post comments
Printer-friendly version
- Read more
- 795 reads
PDF version
Security and Proprietary Software
Submitted by Roy Schestowitz on Sunday 24th of January 2021 06:08:02 AM Filed under
-
diffoscope 165 released
The diffoscope maintainers are pleased to announce the release of diffoscope version 165. This version includes the following changes:
[ Dimitrios Apostolou ] * Introduce the --no-acl and --no-xattr arguments [later collapsed to --extended-filesystem-attributes] to improve performance. * Avoid calling the external stat command. [ Chris Lamb ] * Collapse --acl and --xattr into --extended-filesystem-attributes to cover all of these extended attributes, defaulting the new option to false (ie. to not check these very expensive external calls). [ Mattia Rizzolo ] * Override several lintian warnings regarding prebuilt binaries in the * source. * Add a pytest.ini file to explicitly use Junit's xunit2 format. * Ignore the Python DeprecationWarning message regarding the `imp` module deprecation as it comes from a third-party library. * debian/rules: filter the content of the d/*.substvars files
-
SonicWall hardware VPNs hit by worst-case 0-zero-day-exploit attacks
“…have information about hacking of a well-known firewall vendor and other security products by this they are silent and do not release press releases for their clients who are under attack due to several 0 days in particular very large companies are vulnerable technology companies,” BleepingComputer was told via email.
-
Cyber Firm SonicWall Says It Was Victim of ‘Sophisticated’ Hack
The Silicon Valley-based company said in a statement that the two products compromised provide users with remote access to internal resources.
The attackers exploited so-called “zero days” -- a newly discovered software flaw -- on certain SonicWall remote access products, the company said in a statement.
-
Former manager of Microsoft Taiwan investigated for fraud
A former manager at the Taiwanese branch of software giant Microsoft was questioned Friday (Jan. 22) about an alleged fraud scam directed against the company.
In 2016 and 2017, Chang Ming-fang (張銘芳) allegedly colluded with managers of other companies to forge orders to obtain discounts and products at lower prices, UDN reported.
-
School laptops sent by government arrive loaded with malware [iophk: Windows TCO]
A number of the devices were found to be infected with a "self-propagating network worm", according to the forum, and they also appeared to be contacting Russian servers, one teacher wrote. The Windows-based laptops were specifically infected with Gamarue.1, a worm Microsoft identified in 2012.
-
Ransomware provides the perfect cover
Look at any list of security challenges that CISOs are most concerned about and you’ll consistently find ransomware on them. It’s no wonder: ransomware attacks cripple organizations due to the costs of downtime, recovery, regulatory penalties, and lost revenue. Unfortunately, cybercriminals have added an extra sting to these attacks: they are using ransomware as a smokescreen to divert security teams from other clandestine activities behind the scenes.
Attackers are using the noise of ransomware to their advantage as it provides the perfect cover to distract attention so they can take aim at their real target: exfiltrating IP [sic], research, and other valuable data from the corporate network.
-
Global ransom DDoS extortionists are retargeting companies
According to Radware, companies that received this letter also received threats in August and September 2020. Security researchers’ analysis of this new wave of ransom letters suggested that the same threat actors from the middle of 2020 are behind these malicious communications.
When the DDoS extortion campaign started in August of 2020, a single Bitcoin was worth approximately $10,000. It’s now worth roughly $30,000. The attackers cited this in the latest round of ransom letters, and it represents the impact the rising price of Bitcoin is having on the threat landscape.
A few hours after receiving the message, organizations were hit by DDoS attacks that exceeded 200 Gbps and lasted over nine hours without slowdown or interruption. A maximum attack size of 237 Gbps was reached with a total duration of nearly 10 hours, the alert warned.
-
Boeing 737 MAX is a reminder of the REAL problem with software | Stop at Zona-M
And that problem almost never is software.
- Login or register to post comments
Printer-friendly version
- Read more
- 1419 reads
PDF version
Security Leftovers
Submitted by Roy Schestowitz on Saturday 23rd of January 2021 10:32:42 AM Filed under
-
Oh, the Irony! Chrome is Blocking Security Tool Nmap Downloads Considering it a Security Threat
Nmap is a popular open-source tool created by Gordon Lyon used by security experts and network admins to analyze the network, find exploits, and keep it secure.
However, it seems that for a day at least, Google Chrome blocked all Nmap downloads using its Safe Browsing service by labelling it as a threat.
Even though this has been fixed quickly. For many visitors trying to download the tool, this must have been confusing. A software that’s more than a decade old is now suddenly considered as a threat?
-
Logging as a service isn't SIEM -- so what is it?
Log management software is often confused or conflated with security information event management (SIEM) software. Both monitor and analyze system and application data, so vendors often blur the lines between the two categories, with many SIEM products including a log management module. Conversely, some log management vendors also have SIEM offerings that work with or supplement their logging products.
The primary distinction between log management and SIEM is focus. SIEM tools prioritize data and metrics relevant to security, not the totality of an environment's system, user and application log output. Log management software and services provide a scalable, holistic platform to collect, manage, archive and analyze all of an IT environment's log output -- on premises and in the cloud.
-
Laptops given to British schools came preloaded with malware and talked to Russia when booted [iophk: Windows TCO]
These devices have shipped over the past three to four weeks, though it is unclear how many of them are infected. One source at a school told The Register that the machines in question seemed to have been manufactured in late 2019 and appeared to have had their DfE-specified software installed last year.
-
Democrats seek answers on impact of Russian cyberattack on Justice Department, Courts [iophk: Windows TCO]
The senators’ concerns come weeks after both the Justice Department and the U.S. Courts reported that they had been among the federal agencies compromised by the Russian attack on SolarWinds, which was uncovered in December but had been ongoing for more than a year.
In a statement earlier this month, a DOJ spokesperson said around 3 percent of the agency’s employee email accounts had been “potentially accessed” as part of the breach, but that there was “no indication that any classified systems were accessed.” DOJ has more than 100,000 employees.
The federal judiciary confirmed it was breached the same week as DOJ, noting in a statement that the AO’s Case Management/Electronic Files system had suffered an “apparent compromise,” with new procedures immediately put in place to file sensitive court documents.
-
Biden inherited one of the worst [cracks] in history. How will his administration respond?
But that's the easy part. The SolarWinds [attack] — named for the Texas software company that Russia [cracked] in order to gain access to tens of thousands of its customers, many of them American businesses and federal agencies — ran undetected for at least nine months, siphoning off private information before it was discovered in December.
At least five federal agencies have admitted they were affected. Several others have so far refused to comment. Few private companies have admitted to being victims, but experts say the working assumption is the number is in the hundreds.
That's left cybersecurity experts with the labor-intensive task of combing through sensitive networks.
- Login or register to post comments
Printer-friendly version
- Read more
- 1229 reads
PDF version
Latest Patches and Latest Fear, Uncertainty, Doubt/Fear-mongering Tactics Against "Linux"
Submitted by Roy Schestowitz on Friday 22nd of January 2021 10:18:41 PM Filed under
-
Security updates for Friday
Security updates have been issued by Debian (drupal7), Fedora (dotnet3.1), Gentoo (zabbix), openSUSE (ImageMagick and python-autobahn), and SUSE (hawk2 and wavpack).
-
DreamBus, FreakOut Botnets Pose New Threat to Linux... [Ed: How to blame on "Linux" things that have nothing to do with Linux and boil down to negligent or incompetent sysadmins mismanaging things that aren't even Linux]
-
DreamBus Botnet Targets Linux Systems
Zscaler's ThreatLabz research team is tracking a new botnet dubbed DreamBus that's installing the XMRig cryptominer on powerful enterprise-class Linux and Unix systems with the goal of using their computing power to mine monero.
-
Hazardous fresh malware marks unpatched Linux machines [Ed: Linux may be patched; the problem is not Linux at all and it is dishonest to blame this on Linux]
Security investigators files report on a fresh malware that marks inadequately configured computer desktops to wrap them into a botnet, that can subsequently be utilized for scandalous objectives or any violations.
As per the reports of the Check Point Research (a.k.a CPR), the malware type, called FreakOut, precisely preys Linux embedded machines that operate unpatched editions of specific application on desktop.
-
DreamBus Botnet Targets Linux Systems [Ed: No, it targets unpatched software that is not Linux]
- Login or register to post comments
Printer-friendly version
- Read more
- 1425 reads
PDF version
IPFire is Open Source software, and it going to be Open Source for forever
Submitted by Rianne Schestowitz on Friday 22nd of January 2021 06:12:05 PM Filed under


I feel that this is a pledge that needs repeating since many projects have recently turned their backs at Open Source software. Here is a quick ready why this is very dangerous to the future of the internet.
I am seriously concerned about the future of the Open Source eco system. Times are tough. The world is battling a pandemic and many companies are in trouble. Some have already shut down, others are close to that and that is a very bad thing in its own right.
Low confidence in business causes that people might be more likely to be made redundant and obviously having a little bit of money on the side would help you sleeping better in the night. But if that money would come from software that you have been developing as a hobby or slightly more than that, I can only tell you: Do not be greedy.
- Login or register to post comments
Printer-friendly version
- Read more
- 1297 reads
PDF version
Security Leftovers
Submitted by Roy Schestowitz on Friday 22nd of January 2021 02:54:18 PM Filed under
-
Go read this report about the US military endangering passenger jets by blocking GPS
The military is carrying out the testing, ironically, to help develop technology to counteract GPS jamming. To be fair, it’s an understandable goal, as the article details the troubles that pilots face when a technology they heavily rely on goes away. But when that happens, the pilot at least has visual cues and other instruments. The article also goes into how, instead of completely cutting out the pilot’s GPS signal, the testing can end up feeding the pilot incorrect information, leading to thinking they’re somewhere they’re not.
Each tangent the article goes on reveals worrying new details, like how pilots are warned that testing may be happening, often leading to smooth flights and a “Chicken Little” situation where pilots have heard false warnings so many times that they’re not prepared for when it actually happens. There are also hints that the problem may be happening more often than even the Federal Aviation Administration realized.
-
Powershell Dropping a REvil Ransomware
This is a classic bypass for logging and AV detection[3]. Then, a second RunSpace is started: [...]
-
World Economic Forum pegs cybersecurity failure as a major global risk [iophk: Windows TCO]
Against such sophisticated threats, the vast majority of defenders don’t stand a chance, Clements added. “It’s often shocking to the security professionals tasked with protecting an organization and its data just how easy it is to bypass or defeat security controls like antivirus or how fast attackers can crack passwords,” he said.
-
Department of Defense appoints John Sherman as acting CIO
The Department of Defense (DoD) has replaced outgoing CIO Dana Deasy with deputy CIO John Sherman, who will head up the DoD's cloud strategy until a long-term replacement is in place.
Sherman, who’s served as the deputy CIO at the DoD since June 2020, steps into the role Deasy left as America welcomed the Biden administration. Before that, Sherman was the intelligence community CIO, where he began in 2017 coordinating IT modernization across 17 agencies. From 2014 to 2017, he was the Deputy Director of the CIA's Open Source Enterprise (OSE). In his role, Sherman enhanced the CIA's open-source intelligence (OSINT) initiative.
He’s also served at the National Geospatial Intelligence Agency (NGA) and was the Deputy National Intelligence Officer for Military Issues on the National Intelligence Council.
-
Thanks for the data, suckers: How information insecurity endangers Russian Railways passengers and risks prison for the company’s I.T. workers
On January 13, a hacker dubbed “LMonoceros” posted proof that he broke into the private network of Russian Railways (RZD) and accessed surveillance from cameras at train stations, on railway platforms, along rail tracks, and inside company offices. RZD employees contacted the hacker and together they patched the weakness in the network. This isn’t the first time Russian Railways has had problems with information security: In the past year and a half, the personal information of 700,000 employees and 1.3 million passengers has leaked, and the Wi-Fi aboard highspeed Sapsan trains was hacked in just 20 minutes. Meduza explains how RZD security problems threaten company employees.
-
What is a Distributed Denial of Service Attack? | TheITstuff
What is a Distributed Denial of Service Attack? also termed DDos Attack. The question is very common among computer or programming students who are learning about hacking techniques. This question is also asked by willing to be a white hat hacker one day. If you have the same question as well, let’s understand what this is.
Disclaimer – I will be simplifying the DDoS process massively in this article just to give you an outline of the DDoS attacks. In reality, the DDoS attacks can be extremely complicated. After every DDoS attack, a team of engineers sit together and check logs of all network devices to figure out how the attack happened.
- Login or register to post comments
Printer-friendly version
- Read more
- 842 reads
PDF version

More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
AMD Schedutil vs. Performance Governor Benchmarks On Linux 5.11 Shows More Upside Potential
With a pending patch, the Linux 5.11 AMD Zen 2 / Zen 3 performance is looking very good as far as the out-of-the-box performance is concerned when using Schedutil as is becoming the increasingly default CPU frequency scaling governor on more distributions / default kernels. With the previously noted Linux 5.11 regression addressed from when the AMD CPU frequency invariance support was first introduced, the Schedutil performance from small Ryzen systems up through big EPYC hardware is looking quite good. But how much upside is left in relation to the optimal CPU frequency scaling performance with the "performance" governor? Here is a look at those benchmarks on Ryzen and EPYC for Schedutil vs. Performance on a patched Linux 5.11 kernel.
| today's howtos
|
10 Best Linux Distros for Developers
While Linux might not be the favored operating system for casual users, it’s the go-to choice for most developers and programmers. Linux is a more practical OS that was explicitly designed with programming and developers in mind.
There are over 600 Linux distros to choose from, so even experienced users may seldom struggle to find their current project's ideal flavor. Linux distributions can vary hugely from one another, even though they are based on the same source. And if you’re looking to learn more about Linux distros, we’ve compiled a list of the 10 best Linux distros for developers.
| Puppy Linux Review and its Status Quo in the Linux CommunityIf we had 30 seconds to describe Puppy Linux bluntly, we would classify it as an OS under the light-weight Linux distro family with a functional objective of creating a smooth and easy user experience while simultaneously minimizing the memory footprint usage as much as possible. In this context, the memory footprint refers to the RAM, or Main Memory is used while software like an Operating System is active or operational.
This 30-second assumptive description on Puppy Linux characterizes it as a Linux distro suitable for personal or home-user computers. If we are to assign it a birth year, then it would be 2003, and its creator being Barry Kauler.
Puppy Linux stands out in the Linux community despite its name not being hailed on regular occasions as other Linux distros like Ubuntu, Fedora, Centos, and Kali Linux. The respect it has in these user communities is due to its outstanding positive attributes on display.
|
Recent comments
47 min 1 sec ago
48 min 42 sec ago
6 hours 54 min ago
12 hours 51 min ago
14 hours 39 min ago
14 hours 45 min ago
14 hours 51 min ago
14 hours 53 min ago
22 hours 53 min ago
22 hours 56 min ago