Language Selection

English French German Italian Portuguese Spanish

Security

A Look at Pentoo Linux and Its Security Analysis Tools

Filed under
Linux
Security

There is no shortage of security-focused Linux distributions on the market, and among them is Pentoo Linux. While some security-focused Linux distributions concentrate on privacy, like Tails, others like Kali Linux and Pentoo focus on security research, providing tools that enable research and penetration testing. Pentoo Linux differentiates itself from other security Linux distributions in a number of ways. The primary difference is the fact that Pentoo is based on Gentoo Linux, which is a source-based Linux distribution that uses the Portage package-management system. Gentoo has capabilities known as "Hardened Gentoo," which Pentoo also inherits, providing users with additional security configuration and control for the Linux distribution itself. Pentoo 2015 RC 3.7 was released Jan. 5, providing updated tools and features. Among the new features is the integrated ability to verify that the distribution files have not been corrupted. Pentoo provides many applications for security analysis, including wireless, database, exploit, cracking and forensic tools. In this slide show, eWEEK looks at key features and tools in the Pentoo 2015 RC3.7 release.

Read more

Red Hat: Security Makes Paying for Open Source Software Worth It

Filed under
Red Hat
Security

Open source software vendors do something akin to selling air: They get people to pay for something that easily, and perfectly legally, can be had for free. But added security is becoming an increasingly important part of the value proposition, as Red Hat (RHT), maker of one of the leading Linux enterprise distributions, emphasized this week in a statement on its software subscriptions.

Read more

Disk Encryption Tests On Fedora 21

Filed under
GNU
Graphics/Benchmarks
Linux
Security

If you've been wondering about the impact of enabling full-disk encryption when doing a fresh install of Fedora 21, here's some reference benchmarks comparing the Anaconda option of this latest Fedora Linux release.

Read more

VIDEO: Interview with ESET about Windigo & Advanced Linux Server-Side Threats

Filed under
GNU
Linux
Security

iTWire interviews ESET Malware Researcher Olivier Bilodeau, on his way to be one of the speakers at the 2015 Linux.conf.au conference, presenting on advanced Linux server-side threats.

Read more

Tails 1.2.3 is out

Filed under
GNU
Linux
Security
Debian

On January 3rd, the SSL certificate of our website hosting provider, boum.org, expired. This means that if you still are running Tails 1.2.1 or older, you will not get any update notification. Please help spreading the word!

Read more

Under the hood of I2P, the Tor alternative that reloaded Silk Road

Filed under
OSS
Security

Tor is apparently no longer a safe place to run a marketplace for illegal goods and services. With the alleged operator of the original Silk Road marketplace, Ross Ulbricht, now going to trial, the arrest of his alleged successor and a number of others in a joint US-European law enforcement operation, and the seizure of dozens of servers that hosted "hidden services" on the anonymizing network, the operators of the latest iteration of Silk Road have packed their tents and moved to a new territory: the previously low-profile I2P anonymizing network.

Read more

Update on Red Hat Enterprise Linux 6 and FIPS 140 validations

Filed under
Red Hat
Security

Red Hat achieved its latest successful FIPS 140 validation back in April 2013. Since then, a lot has happened. There have been well publicized attacks on cryptographic protocols, weaknesses in implementations, and changing government requirements. With all of these issues in play, we want to explain what we are doing about it.

Read more

Also: Mysteries of NUMA Memory Management Revealed

Here is How I Built my First RPM

Exiv2 Vulnerability Closed in Ubuntu 14.10

Filed under
Security
Ubuntu

Canonical has published details in a security notice about a Exiv2 vulnerability in Ubuntu 14.10 (Utopic Unicorn) that has been found and corrected. This not a major issue, but users should upgrade nonetheless.

Read more

Fedora 22 Might Disable Root Remote Logins By Default

Filed under
Red Hat
Security

Right now Fedora allows for SSH log-ins as root, which is the default behavior as currently shipped by sshd. However, for Fedora 22 there is a proposal that the packaged sshd will default the option of PermitRootLogin to no so that root log-ins wouldn't be permitted into Fedora SSH servers. This change is being proposed to try to avoid brute-force attacks against root passwords of Fedora servers.

Read more

Will Open Source Security Be on the Federal Agenda in 2015?

Filed under
OSS
Security

Open source code security has been in the spotlight since the Heartbleed bug infected the Canada Revenue Agency website last year. Found embedded in OpenSSL, one of the Web’s most common security systems, Heartbleed sent public-sector IT personnel scrambling to test their agencies’ websites to make sure they were clean and protected.

Read more

Syndicate content

More in Tux Machines

Lubuntu 15.10 Alpha 2 Is Ready for Download, Still Using the LXDE Desktop Environment

The development team behind Lubuntu, an open-source and freely distributed flavor of the popular Ubuntu Linux operating system, announced a few minutes ago the release of the second Alpha build for the upcoming Lubuntu 15.10 (Wily Werewolf) distribution. Read more

Ubuntu Kylin 15.10 Alpha 2 Is Out for Testing with Linux Kernel 4.1, More

The development team behind the Ubuntu Kylin computer operating system have announced earlier today the immediate availability for download and testing of the second Alpha build of the upcoming Ubuntu Kylin 15.10 (Wily Werewolf) distro. Read more

Linux-powered smart sniper rifle can be hacked

Two years ago, TrackingPoint burst on to the scene with a Linux-powered smart sniper rifle that took the guesswork out of killshots. Now, however, a pair of hackers have figured out how to make it miss every single time. Read more

5 heroes of the Linux world

Linux and open source is driven by passionate people who write best-of-breed software and then release the code to the public so anyone can use it, without any strings attached. (Well, there is one string attached and that’s licence.) Who are these people? These heroes of the Linux world, whose work affects all of us every day. Allow me to introduce you. Read more