Language Selection

English French German Italian Portuguese Spanish

Security

Remote buffer overflow bug bites Linux Kernel

Filed under
Linux
Security

blogs.zdnet: A remote buffer overflow vulnerability in the Linux Kernel could be exploited by attackers to execute code or cripple affected systems, according to a Gentoo bug report that just became public.

Mac, Linux, BSD open for attack: Kaspersky

Filed under
Security

computerworld.com.au: Looming attacks will soon pop the security bubble enjoyed by Linux and Macintosh users, according to Russian security expert Eugene Kaspersky.

Firefox add-on blocks 'clickjacking' attacks

Filed under
Moz/FF
Security

computerworld.com: A popular Firefox add-on designed to block scripts and plug-ins has been updated to stymie the new "clickjacking" class of attacks, the extension's developer said today.

Vendors rush to fix critical TCP/IP bug

Filed under
Security

techworld.com (IDG): Internet infrastructure vendors are rushing to develop patches for a set of TCP/IP security flaws, which could help hackers knock servers offline with very little effort. Robert Lee and Jack Louis, have said that they can knock Windows, Linux, embedded systems and even firewalls offline.

How To Stop Firefox Clickjacking Exploit Attack

Filed under
Security

cyberciti.biz: Really scary exploit attack in wild, which affects all browsers under any desktop operating systems including MS IE, Linux, Apple safari, Opera, Firefox and Adobe flash. Any website that uses CSS, flash and IFRAME can be used to attack on end users. Attacker is able to take control of the links that your browser visits.

Hackers attack Large Hadron Collider

Filed under
Security

telegraph.co.uk: Hackers have mounted an attack on the Large Hadron Collider, raising concerns about the security of the biggest experiment in the world as it passes an important new milestone.

Red Hat's security issue

Filed under
Linux
Security

blog.perens.com: Last month, Red Hat issued a security bulletin. Not all that went on is clear, but it seems that the servers used to develop and distribute Fedora and Red Hat were accessed by a person with criminal intent. But there are continuing problems with Red Hat's handling of the situation.

Also: Fedora and our security attitude

Putting A 'Korset' On The Spread Of Computer Viruses

Filed under
Software
Security

sciencedaily.com: Anti-virus companies play a losing game. But Prof. Avishai Wool recently unveiled a unique new program called the “Korset” to stop malware on Linux, the operating system used by the majority of web and email servers worldwide.

New security hole in VLC video player

Filed under
Security

heise-online.co.uk: A new critical security hole has been found in the VLC player from the VideoLan project, while there is still no public fix for the previous security hole found two weeks ago.

Linux under attack: Compromised SSH keys lead to rootkit

Filed under
Linux
Security

blogs.zdnet: The U.S. Computer Emergency Readiness Team (CERT) has issued a warning for what it calls “active attacks” against Linux-based computing infrastructures using compromised SSH keys.

Syndicate content

More in Tux Machines

Testing Fedora 21 fitness for world population with Internationalization

Fedora is a global Linux distribution, as soon as we say the word “Global”, immediately internationalization (i18n) and localization(l10n) become a utmost important part of the distribution. Read more

Ondemand vs. Performance CPU Governing For AMD FX CPUs On Linux 3.17

In the tests shared yesterday of looking at the AMD FX-9590 CPU on Linux and other CPU benchmarks from this weekend, some Phoronix readers raised concerns about the CPU scaling governor differences between the AMD and Intel hardware. The AMD FX CPUs continue to use the CPUfreq driver by default to handle their scaling while modern Intel CPUs have the new Intel P-State driver. Beyond the Intel-specific P-State vs. CPUfreq, the AMD CPUs generally default to using the "ondemand" governor while with Intel desktop CPUs on P-State it generally ends up with the "performance" mode. Some Phoronix readers found performance vs. ondemand differences to be unfair, but for AMD FX CPUs, there isn't much of a difference in our common CPU torture test benchmarks found in the Phoronix Test Suite. Read more

Google Sends Invites for September 15 India Event; Android One Launch Likely

Google has sent invitations for an event in India on September 15. While the invite itself says "More details closer to the date!", it is expected that the much-awaited Android One smartphones will make their debut at the event. Android One was announced back in June at Google I/O with India's Karbonn, Micromax, and Spice the confirmed launch partners, though more Indian companies have reportedly joined the list since then. Read more

SHIRTS AND METHODS TO IDENTIFY THE PLAYERS - NFL JERSEYS

The jersey inside outwards, observe the situation embroidery section. Genuine jerseys are embroidered was "Z" shaped, embroidered on shirts, very smooth, in-house embroidery almost no sense of touch. Cheap nfl jerseys from china. The fakes are tight with the line directly to the number sewn on clothes.

Cheap nfl jerseys wholesale. Genuine Hawks player version jersey. Careful observation will find clothes with black "Z" shaped seams on clothes, that this line will be connected to the number and shirts, can make the wearer feel very comfortable, there will be uneven sense!

Finally, I want to make a comparison between true and false jersey, we want to want to buy a shirt to help a friend. Want to buy legal copies of NFL jerseys in the country is quite difficult. Domestic NFL licensed should be small. I discovered two years ago have sold Packers and bengals jerseys offset printing adults at a Reebok store in Xiamen. The price is very expensive, like the shelves soon after never seen. Now search for Taobao, filled with many counterfeit NFL jerseys player version. Cheap jerseys free shipping. Most of these jerseys rough work, by a number of embroidery, the workmanship is very sick.