Language Selection

English French German Italian Portuguese Spanish

Security

Palm accused of 'spying' on Pre owners

Filed under
Hardware
Security

telegraph.co.uk: Palm Pre owner Joey Hess claims to have uncovered code within the phone's operating system which shows that the device is sending back information about his location to Palm.

Dangerous Security Flaw Likely Just a Hoax

Filed under
Security

pcworld.com: A claim of a software vulnerability in a program used to connect securely to servers across the Internet is likely a hoax, according to an analyst with the SANS Internet Storm Center.

Rumours of critical vulnerability in OpenSSH in Red Hat Enterprise Linux

Filed under
Linux
Security

h-online.com: A posting on the Web Hosting Talk forum is feeding speculation about a critical security vulnerability in the OpenSSH server in CentOS/Red Hat Enterprise Linux (RHEL).

SquirrelMail open source project's web server hacked

Filed under
Security
Web

h-online.com: It has just become apparent that, on June 16, attackers hacked into the web server of the SquirrelMail open source project. The operators have suspended all accounts and reset all crucial passwords.

Stop illegal Steganography

Filed under
Security

Some of the more nefarious Steganography tactics include hiding information for illegal reasons. Learn whats at stake and how to detect and thwart Steganography techniques and blunt its effectiveness.

SELinux vs AppArmor vs Grsecurity

Filed under
Linux
Security
HowTos

cyberciti.biz: Linux kernel is the central component of Linux operating systems. It is responsible for managing the system's resources, the communication between hardware and software and security. Unfortunately, stock kernel is not secured out of box. There are some important Linux kernel patches to secure your box. They differ significantly.

Evolution vs sha256, or why my new key is useless

Filed under
Software
Security

ubuntu-nl.org/dennis: There’s one problem though: even when you generate a new gpg key that supports better hashing, your applications will still need to support the better hashing for it to be effective.

They Came a Knockin and Webmin Let Them In

Filed under
Software
Security

thelinuxlink.net: Today was a sad day. I found out my streaming mirror/microblog server had been cracked. They exploited webmin and set up shop. Alas, there is no one to blame but myself. This is how I believe it went down.

10 Steps for Basic Linux Desktop Security

Filed under
Linux
Security
HowTos

linuxsysconfig.com: I agree that Linux is less vulnerable than Windows, but that doesn’t make it immune to attackers. It’s not always about security flaws, buffer overflows or denial of service attacks. I came up with a list of 10 basic rules that should reduce the security risk.

Do you need to worry about the new /dev/mem rootkit problem?

Filed under
Security

blog.ibeentoubuntu.com: A new paper was presented in late March about using /dev/mem to inject and hide a rootkit (PDF), and the method has been getting some press, leading to a little concern.

Syndicate content

More in Tux Machines

Firefox OS media-casting stick strikes Kickstarter gold

The first Firefox OS based media player has arrived on Kickstarter, in the form of a $25 open-spec HDMI stick that supports Chromecast-like content casting. The Matchstick, which has already zoomed past its Kickstarter campaign’s $100,000 funding goal, with 28 days still remaining, was teased back in June by Mozilla developer evangelist Christian Heilmann. The unnamed prototype was billed as an open source HDMI stick that runs Mozilla’s Linux-based Firefox OS and offers casting capabilities. Few details were revealed at the time except that the device used the same DIAL (DIscovery And Launch) media-casting protocol created by Netflix and popularized by Google’s Chromecast. Read more

Open source history, present day, and licensing

Looking at open source softwares particularly, this is a fact that is probably useful to you if you are thinking about business models, many people don't care about it anymore. We talk about FOSS, Free and Open Source Software, but if we really are strict there's a difference between free software and open source software. On the left, I have free software which most typically is GPL software. Software where the license insures freedom. It gives freedoms to you as a user, but it also requires that the freedoms are maintained. On the right-hand side, you have open source software which is open for all, but it also allows you to close it. So here we come back to the famous clause of the GPL license, the reciprocity requirement which says, "If I am open, you need to be open." So software that comes under the GPL license carries with it something that other people call a virus. I call it a blessing because I think it's great if all software becomes open. Read more

Leftovers: Software

Proprietary

today's howtos