Language Selection

English French German Italian Portuguese Spanish

Security

Nvidia has Linux security hole

Filed under
Security

the inquirer: AN ADVISORY from a security researcher called Gregory Shikhman points out that Nvidia drivers have a rather gaping hole when installed under Gentoo Linux.

Gentoo Infrastructure Press Release

Filed under
Gentoo
Security

On August 7, 2007, bannedit reported bug 187971 regarding a possible command injection vulnerability within http://packages.gentoo.org. The Infrastructure team verified the vulnerability and the server was immediately taken down to prevent further exploitation and to allow for forensic analysis.

Unix/Linux rootkits 101

Filed under
Security

techrepublic blogs: The term rootkit originated with a reference to the root user account on Unix systems. Rootkits are not limited to Unix, however, or even to administrative user accounts like the Unix root account. No matter what operating system you use, you should be familiar with good practices for detecting and dealing with the threat of rootkits.

Also: Clamav is great

Alleged critical holes in Xvid

Filed under
Security

heise-security: According to reports from several security services, the Xvid 1.1.2 Video Codec Library has a security hole which attackers could use to gain control over a PC. Both Windows and Linux applications are affected.

Detect insider threats with Linux auditing

Filed under
Security

linux.com: Organizations of all sizes need to mitigate the risk of insider threats. Misconduct by authorized users represents a grave threat to an organization. You can secure your network perimeter with intrusion detection systems, firewalls, and virus scanners, but don't neglect to monitor authorized users. The Linux Audit daemon can help you detect violations of your security policies.

Open source: New target of malware?

Filed under
Security

ZDNet: The recent OpenOffice worm may be a sign that malware writers are starting to target the increasingly popular open-source software, industry experts say.

Linux configure point to point tunneling PPTP VPN client for Microsoft PPTP vpn server

Filed under
Linux
Hardware
Software
Security
BSD
Ubuntu
HowTos

With this tip you will be able to work from home using VPN and that too from Linux / FreeBSD system for the proprietary Microsoft Point-to-Point vpn server.

Introducing Remo - An Easy Way to Secure an Insecure Online Application with ModSecurity

Filed under
Linux
Security
HowTos

Say you have a nasty application on your Apache webserver that has been installed by some people from the marketing department and you can neither remove nor patch it. Maybe it is a time problem, a lack of know-how, a lack of source-code, or possibly even political reasons. Consequently you need to protect it without touching it. There is ModSecurity, but they say this is only for experts. A straightforward alternative is Remo, a graphical rule editor for ModSecurity that comes with a whitelist approach.

OpenOffice worm hits Mac, Linux and Windows

Filed under
Security
OOo

builderau: Malware targeting OpenOffice documents is spreading through multiple operating systems including Mac OS, Windows and Linux, according to Symantec.

Windows vs Linux security report card redux

Filed under
Security

zdnet blogs: Jeff Jones has expanded his project to count security flaws (publicly reported and fixed) in the major workstation operating systems and his latest numbers show Windows Vista has by far the best security profile when compared to the major Linux distributions.

Syndicate content

More in Tux Machines

Black Lab SDK 1.8 released

QT Creator - for QT 5 Gambas 3 - Visual Basic for Linux Ubuntu Quickly - Quick and dirty development tool for python emacs and Xemacs - Advanced Text Editor Anjuta and Glade - C++ RAD development tool for GTK Netbeans - Java development environment GNAT-GPS - IDE for the following programming languages. Ada, C, JavaScript, Pascal and Python Idle - IDE for Python Scite - Text Editor Read more

Did Red Hat’s CTO Walk – Or Was He Pushed?

He went on to say that some within Red Hat speculate that tensions between Stevens and Paul Cormier, Red Hat’s president of products and technologies, might be responsible, although there doesn’t appear to have been any current argument between the two. Cormier will take over Stevens’ duties until a replacement is found. Vaughan-Nichols also said that others at Red Hat had opined that Stevens might’ve left because he’d risen as high as he could within the company and with no new advancement opportunities open to him, he’d decided to move on. If this was the case, why did he leave so abruptly? Stevens had been at Red Hat for nearly ten years. If he was leaving merely because “I’ve done all I can here and it’s time to seek my fortune elsewhere,” we’d expect him to work out some kind of notice and stay on the job long enough for Red Hat to find a suitable replacement. Turning in a resignation that’s effective immediately is not the ideal way to walk out the door for the last time. It smells of burning bridges. Read more

Firefox OS Smartphones Change The Mobile Landscape Across India

The launch of two Firefox OS phones in India in the same week marks an exciting moment in Mozilla’s mission to promote openness and innovation on the Web, and an opportunity to empower millions of Indians wanting to buy their first smartphones. Firefox OS will enable users to obtain lower-cost devices that offer telephony, messaging and camera and rich capabilities like built-in social integration with Facebook and Twitter, the Firefox browser, FM radio and popular apps. Read more

Mozilla Marches Ahead with Ads for Firefox

This November, Mozilla is up for renegotiation with Google for placement of Google search as the default search in Firefox and for the related subsidies that Google pays Mozilla, which reached almost $300 million last year. That comprised the majority of Mozilla's income. With Chrome establishing itself as a leader in the browser wars, its unclear what relationship Google will continue to pursue with Mozilla. Read more