Language Selection

English French German Italian Portuguese Spanish

Security

Tails 1.1 Beta 1 Secure Distro Now Has Windows 8 Comouflage Mode

Filed under
GNU
Linux
Security
Debian

Tails is a distribution based on Debian and Tor technologies that aims to keep its users as anonymous as possible. It gained a lot more visibility after Edward Snowden said that he used exactly this Linux distribution to hide his tracks. The developers are now implementing more changes and fixes that should ensure it becomes even more secure.

Read more

TrueCrypt Not Dead, Forked and Relocated to Switzerland

Filed under
Security

The development of TrueCrypt, an open source piece of software used for on-the-fly encryption, has been terminated and users have been advised not to use it because it is not secure enough. Now, it seems that another team of developers have forked the software and rebased it in Switzerland.

Read more

Kali Linux 1.0.7 review

Filed under
Reviews
Security

The latest update to Kali Linux was released a few days ago. Kali Linux 1.0.7 review is a summary review of the main features of this latest upgrade to the security distribution from Offensive Security, a security and penetration training outfit based somewhere on this third rock from the Sun.

The main feature introduced in Kali Linux 1.0.7 is the ability to transfer the system to a USB stick with encrypted persistence.

Read more

The Linux Foundation’s Core Infrastructure Initiative Announces New Backers, First Projects to Receive Support and Advisory Board Members

Filed under
Linux
Security

The Core Infrastructure Initiative (CII), a project hosted by The Linux Foundation that enables technology companies, industry stakeholders and esteemed developers to collaboratively identify and fund open source projects that are in need of assistance, today announced five new backers, the first projects to receive funding from the Initiative and the Advisory Board members who will help identify critical infrastructure projects most in need of support.

Read more

Hands-on with Kali Linux 1.0.7

Filed under
Linux
Security

One last thing about booting Kali Linux. The details of this are beyond the scope of this kind of general Linux blog, but one of the major advances in this release is support for Encrypted USB Persistence. This is specifically for people who will be booting Kali from a USB stick, it gives them the possibility to securely save changes to an encrypted partition on the USB drive. I haven't had time to look at this in detail yet, much less actually try it out, but at first glance I think it probably removes one of the major reasons for carrying a dedicated laptop around for security analysis, rather than just a Live USB stick.

So there you have it, short and very sweet. If you are interested in network security, forensic analysis or penetration testing, this is a Linux distribution you need to know about. If you're already using it, just make sure that you pick up the latest updates so that you get the new kernel and tools.

Read more

BackTrack Successor Kali Linux 1.0.7 Arrives with Linux Kernel 3.14

Filed under
Linux
Security

As usually, Kali Linux 1.0.7 features various new tools, updated applications, as well as numerous fixes in order to make Kali Linux a more stable and reliable Linux operating system. This includes a new version of the Linux kernel, among other things.

There are numerous Linux distributions in the open source ecosystem, but there are very few built specifically for penetration testing and digital forensics. The former iteration of this distro, BackTrack, is one of the most downloaded OSes and it's the go-to operating system when you need a professional solution.

Read more

Meet the Man Hired to Make Sure the Snowden Docs Aren't Hacked

Filed under
Linux
Security

When he got to Rio, Lee spent one entire day strengthening Greenwald’s computer, which at that point used Windows 8. Lee was worried spy agencies could break in, so he replaced the operating system with Linux, installed a firewall, disk encryption and miscellaneous software to make it more secure.

Read more

Notable Penetration Test Linux distributions of 2014

Filed under
GNU
Linux
Security

A penetration test, or the short form pentest, is an attack on a computer system with the intention of finding security weaknesses, potentially gaining access to it, its functionality and data. A Penetration Testing Linux is a special built Linux distro that can be used for analyzing and evaluating security measures of a target system.

Read more

Silent Circle secures $30 million in funding to expand Blackphone production

Filed under
Android
Security

Private communications firm Silent Circle has secured $30 million in funding to cope with demand for the privacy-based Blackphone, as well as expand operations globally.

Read more

Security's future belongs to open source

Filed under
OSS
Security

The proof that open source, properly applied, is available. Studies, such as the one recently done by Coverity, have found that open-source programs have fewer errors per thousand lines of code than its proprietary brothers. And, it's hard to ignore the Communications-Electronics Security Group (CESG), the group within the UK Government Communications Headquarters (GCHQ) that assesses operating systems and software for security issues, when they said that that while no end-user operating system is as secure as they'd like it to be, Ubuntu 12.04 is the most secure desktop.

On the other hand, the mere existence of Microsoft's monthly Patch Tuesday says everything most of us need to know about how "secure" proprietary software is. I also can't help noticing how every time Microsoft releases a new version of Internet Explorer (IE), they always claim it's the most secure ever. And, then, a new hole is found, and guess what, that same security hole is in every version of IE from IE 6 to IE 11. If IE really were being rewritten to make it secure why are the same holes showing up In Every Version??

Read more

Syndicate content

More in Tux Machines

Android Leftovers

Report from Debian SnowCamp and a Look at Solyd XK, a Debian-Based Distribution

  • Report from Debian SnowCamp: day 1
  • Report from Debian SnowCamp: day 2
    Of course, we’re still sorely lacking volunteers who would really care about mentors.debian.net; the codebase is a pile of hacks upon hacks upon hacks, all relying on an old version of a deprecated Python web framework. A few attempts have been made at a smooth transition to a more recent framework, without really panning out, mostly for lack of time on the part of the people running the service. I’m still convinced things should restart from scratch, but I don’t currently have the energy or time to drive it… Ugh.
  • Installing Solyd XK, a Debian based Linux distribution : Cooking With Linux
    It's time for some more "Cooking With Linux" without a net, meaning the video you are about to watch was recorded live. Today, I'm going to install a new Linux distribution (new to me, anyhow) called Solyd XK.

Aquaris E4.5 Ubuntu Phone - With Android

I ever so slightly regret the "upgrade" to Android. With a version less than the tablet, the UI changes are extremely noticeable, and the transition isn't as smooth. The device lags, and it just doesn't have enough processing power to give the necessary feel of goodness and elegance. On the other hand, you get tons of native applications that you can actually use, as opposed to the Ubuntu Touch idea. Shame really. For 'tis a compromise. If you ask me, I wholeheartedly embrace the M10 tablet upgrade, but on the phone, you might as well keep Ubuntu unless you need the device for serious use. If it's just an opportunistic call/SMS thing for when abroad and such, or to loan to friends, the original combo is adequate. If you need apps, then Android is the way to go, but do not except any miracles. It won't be speedy, and it won't be too pretty. All in all, an okay player. It is silly attaching sentiments to software or hardware, but I do guess I will fondly remember the Ubuntu phone attempt as a noble idea to make something great and fun. I could have kept the device in its original state, perhaps, but in the end, it would have ended in a pile of ancient stuff you keep around for a decade until you decide you need to throw it away to leave room for fresh memories and less ancient stuff. Having a flawless Android experience would have helped soften the edge, but as it is, it remains the bittersweet attempt at what could have been a revolution. The end. Read more Also: Ubuntu Desktop weekly update – February 23, 2018

​Docker and Red Hat News

  • ​Docker has a business plan headache
    We love containers. And, for most of us, containers means Docker. As RightScale observed in its RightScale 2018 State of the Cloud report, Docker's adoption by the industry has increased to 49 percent from 35 percent in 2017.
  • Mycroft Widget, Atos and Red Hat's New Cloud Container Solution, npm Bug and More
    Atos and Red Hat announced this morning "a new fully-managed cloud container solution - Atos Managed OpenShift (AMOS) - built on Red Hat OpenShift Container Platform". The press release adds, "Because AMOS is built on Red Hat OpenShift Container Platform, a container-centric hybrid cloud solution, it can deliver the flexibility customers seek from cloud-native and container-based applications."
  • Red Hat Decision Manager 7 Boosts BPM with Low-Code Approach
    Red Hat is perhaps best known for its Enterprise Linux platform, but it has been a player in the Business Process Management (BPM) suite for over a decade too. On Feb. 21, Red Hat Decision Manager 7 was officially announced as the successor to the company's JBoss Business Rules Management System (BRMS) product. Red Hat first released BRMS back in May 2009 which itself was an evolution of the JBoss Rules Engine.
  • Red Hat, Inc. (NYSE:RHT) – Active Stock Evaluation