Language Selection

English French German Italian Portuguese Spanish

Security

Red Hat Infrastructure report

Filed under
Linux
Security

redhat.com: Last week we discovered that some Fedora servers were illegally
accessed. The intrusion into the servers was quickly discovered, and the
servers were taken offline.

Linux Mint Server hacked

Filed under
Linux
Security
Web

linuxmint.com/blog: Our server was hacked and code was injected into it to make connections on our behalf to pinoc.org and download a trojan called JS/Tenia.d

Howto Securely Wipe A Harddrive With Linux

Filed under
Security

Examples of "shred" usage on a fresh install of Ubuntu 8.04.1

DefCon: Restraining Order Issued; Talk Cancelled

Filed under
Security
Legal

blog.wired.com: The Massachusetts Bay Transportation Authority filed a suit in federal court on Friday seeking a temporary restraining order to prevent three undergraduate students from the Massachusetts Institute of Technology from presenting a talk at the DefCon hacker conference this weekend about security vulnerabilities in payment systems used in the Massachusetts mass transit system.

Howto Install Metasploit

Filed under
Security

A tutorial on howto setup Metasploit, a tool for exploit testing, IDS, and pen testing.

How A rootkit Exactly Works

Filed under
Security

How A rootkit Exactly Works — Explaination and dissection of the dica rootkit (a variant of the t0rn rootkit).

Debunking the Linux virus myth

Filed under
Linux
Security

mylro.org: Linux and UNIX-like operating systems in general are regarded as being more secure for the common user, in contrast with operating systems that have "Windows" as part of their name. Why is that?

Malware on GNU/Linux

Filed under
Security

[M]alware includes not just virii, but worms, trojans and root-kits. These known and widely available tools are not the only options available to intruders either. GNU/Linux users should not have any false sense of security just based on the fact that viruses designed for exclusively for windows won't run on GNU/Linux.

GNU/Linux free software tools to preserve your online privacy, anonymity and security

Filed under
Security

Whether you are online or offline, freedom matters. Like good health you never think about it or miss it until it is under threat or actually gone. If you love freedom, you probably love free software and it has given us some terrific tools with which to defend freedom. In this article I will give an overview of some of the available resources (Freenet, Wikileaks and Tor) to protect dissident opinion, facilitate whistle blowing and promote the safe and anonymous development of free software.

Bush Signs Spy Bill, ACLU Sues

Filed under
Security

blog.wired.com: In passing the FISA Amendments Act, US Congress gave the executive branch the power to order Google, AT&T and Yahoo to forward to the government all e-mails, phone calls and text messages where one party to the conversation is thought to be overseas.

Syndicate content

More in Tux Machines

today's leftovers

US Military To Launch Open Source Academy

Open source software, which has become increasingly common throughout the US military from unmanned drones to desktops, has now been enlisted as a career option for military personnel. In September, Camp Shelby Joint Forces Training Center will open a Linux certification academy, marking the first time such a training program has been hosted on a military base. Read more

Video: TedX talk - Richard Stallman

Well, vp9/opus in a webm container have been supported by both Firefox and Google Chrome for several releases now... so enjoy it in your web browser. Read more

Eclipse Luna for Fedora 20

If you are a Fedora Eclipse user, then you're probably saddened since the release of Eclipse Luna (4.4) because you are still using Eclipse Kepler (4.3) on Fedora 20. Well, be saddened no longer because Eclipse Luna is now available for Fedora 20 as a software collection! A software collection is simply a set of RPMs whose contents are isolated from the rest of your system such that they do not modify, overwrite or otherwise conflict with anything in the main Fedora repositories. This allows you install multiple versions of a software stack side-by-side, without them interfering with one another. More can be read about this mechanism on the software collections website. The Eclipse Luna software collection lives in a separate yum repository, which must be configured by clicking on this link to install the release package. Read more