Language Selection

English French German Italian Portuguese Spanish

Security

Do I need an anti-virus in Linux?

Filed under
Linux
Security

dedoimedo.com: And the simple answer is: no, you do not need an anti-virus in Linux. Yes, let me tell you a little secret. Come closer. That's it. You don't need an anti-virus in Windows, either! Boom! There you go.

Got Security? You're in Denial

Filed under
Security
  • Got Security? You're in Denial
  • Collection of security checks for Linux
  • Worst. Security Product. EVER!
  • Multi-user Security in Linux

Apache bug prompts update advice

Filed under
Software
Security
Web

zdnet.com.au: IT security company Sense of Security has discovered a serious bug in Apache's HTTP web server, which could allow a remote attacker to gain complete control of a database.

Be Afraid if Someone's Got a Voltmeter Hooked to Your CPU

Filed under
OSS
Security

ebb.org/bkuhn/blog: I had a hunch what was going on. I quickly downloaded a copy of the academic paper that was cited as the sole source for the story and read it. As I feared, OpenSSL was getting some bad press unfairly.

'Severe' OpenSSL vuln busts public key crypto

Filed under
Security

theregister.co.uk: Computer scientists say they've discovered a "severe vulnerability" in the world's most widely used software encryption package that allows them to retrieve a machine's secret cryptographic key.

The Perils of Sudo With User Passwords

Filed under
Security

longitudetech.com: The consensus among new Unix and Linux users seems to be that sudo is more secure than using the root account, because it requires you type your password to perform potentially harmful actions. In reality, a compromised user account, which is no big deal normally, is instantly root in most setups.

Chuck Norris is not a Linux virus

Filed under
Linux
Security

itworld.com: Get a grip people. A recent story about the so-called Chuck Norris botnet implies that it breaks Linux's security. Wrong.

LUKS mermaids of remote unlock

Filed under
Security

geekscrap.com: Recently, I’ve browsed several how-to’s regarding the possibility of unlocking a LUKS root volume remotely using an SSH connection. The problem with their approach is simple: they asked how to fix their setup, but forgot to ask what they’re trying to protect.

Quick and easy Linux security

Filed under
Linux
Security
HowTos

ghacks.net: You’ve just set up your Linux desktop. Naturally you want it to be as secure as possible. You’ve heard the rumors that, out of the box, Linux has outstanding security. Is it true? Do you really want to take a chance with that? Most likely not. But what can you do?

Tor Project servers hacked

Filed under
Security
Web

h-online.com: The Tor project developers have advised users to update their Tor anonymity software to version 0.2.1.22 or 0.2.2.7-alpha as soon as possible. This is because, in early January, two of the project's seven directory authorities (moria1 and gabelmoo) as well as the metrics.torproject.org statistics server were found to have been hacked.

Syndicate content

More in Tux Machines

Top 3 open source alternatives to Google Analytics

Let’s start off by taking a look at the open source application that rivals Google Analytics for functions: Piwik. Piwik does most of what Google Analytics does, and chances are it packs the features that you need. Those features include metrics on the number of visitors hitting your site, data on where they come from (both on the web and geographically), from what pages they leave your site, and the ability to track search engine referrals. Piwik also has a number of reports and you can customize the dashboard to view the metrics that you want to see. To make your life easier, Piwik integrates with over 65 content management, ecommerce, and online forum systems like WordPress, Magneto, Joomla!, and vBulletin using plugins. With anything else, you just need to add a tracking code to a page on your site. Read more

AN EARLY VIEW OF GTK+ 3.16

We’ve had long-standing feature requests to turn scrollbars into overlayed indicators, for touch systems. An implementation of this idea has been merged now. We show traditional scrollbars when a mouse is detected, otherwise we fade in narrow, translucent indicators. The indicators are rendered on top of the content and don’t take up extra space. When you move the pointer over the indicator, it turns into a full-width scrollbar that can be used as such. Read more

Linux Container Security

Hypervisors present a smaller attack surface than containers. This is somewhat mitigated in containers by using seccomp, selinux and restricting capabilities in order to reduce the number of kernel entry points that untrusted code can touch, but even so there is simply a greater quantity of privileged code available to untrusted apps in a container environment when compared to a hypervisor environment[1]. Read more