Language Selection

English French German Italian Portuguese Spanish

Security

How To Block Spam Before It Enters The Server (Postfix)

Filed under
Linux
Security
HowTos

The last few weeks have seen a dramatic increase in spam (once again). Estimates say that spam makes now up for 80 - 90% of all emails, and many mail servers have difficulties in managing the additional load caused by the latest spam, and spam filters such as SpamAssassin do not recognize large parts of that spam as they did before. Fortunately, we can block a big amount of that spam at the MTA level.

A New Vector For Hackers -- Firefox Add-Ons

Filed under
Security

Washington Post: Makers of some of the most popular extensions, or "add-ons," for Mozilla's Firefox Web browser may have inadvertently introduced security holes that criminals could use to steal sensitive data from millions of users.

Owning computers via spelling mistakes

Filed under
Security

infoworld: Symantec researchers have detailed a painfully simple attack method that hackers may already be using to bypass security protections and break into UNIX and Linux-based computers.

OpenOffice worm downloads bunny porn

Filed under
Security

iTNews: A newly-discovered worm targeting OpenOffice attempts to download indecent JPEG images onto compromised Windows, Mac and Linux PCs.

Secure Websites Using SSL And Certificates

Filed under
Security
HowTos

This article will guide you through the entire process of setting up a secure website using SSL and digital certificates. This guide assumes that you already have a fully functional (and configured) server running Apache, BIND, and OpenSSL.

How Safe are Passwords in Internet Explorer, Firefox, and Opera?

Filed under
Security

CybernetNews: I’m sure many of you look kindly upon the fact that your web browser stores your passwords for you. It is no doubt a wonderful time-saving feature, and surely beats having to retype your password every time that it needs to be entered. Have you ever stopped to ask yourself how safe your passwords really are in your browser?

How secure are Linux, Window and Mac OS?

Filed under
Security

Masuran.org: How secure is your favorite operating system? In a time where OS fanatics battle each other on what OS is the best, security is often one of the turning points of discussion. In this article I will be comparing the vulnerabilities listed on Secunia and assessing how serious they are.

Also: What about Linux spyware?

Howto Setup a Lighttpd Chroot Jail Web Server under Debian Linux

Filed under
Linux
Software
Security
Web
Ubuntu
HowTos

Security, speed, compliance, and flexibility--all of these describe LightTPD which is rapidly redefining efficiency of a webserver; as it is designed and optimized for high performance environments.

The potential danger of .desktop files and more

Filed under
Security

In many X11 desktop environments, links to applications are usually represented by files which have the desktop extension in their names. These files, internally, have a format similar to INI files and specify information such as the command to execute and the icon used when representing it.

Mac and Linux attacks set to rise

Filed under
Security

Speaking to consumer PC mag PC Pro, security guru Eugene Kaspersky said that the lukewarm reception of Vista will result in defections to Mac OS and Linux, thus making them more attractive targets for malware writers.

Syndicate content

More in Tux Machines

Mesa 10.3 release candidate 2

Mesa 10.3 release candidate 2 is now available for testing. The current plan of record is to have an additional release candidate each Friday until the 10.3 release on Friday, September 12th. The tag in the GIT repository for Mesa 10.3-rc2 is 'mesa-10.3-rc2'. I have verified that the tag is in the correct place in the tree. Mesa 10.3 release candidate 2 is available for download at ftp://freedesktop.org/pub/mesa/10.3/ Read more

Linux 3.17-rc3

I'm back to the usual Sunday release schedule, and -rc3 is out there now. As expected, it is larger than rc2, since people are clearly getting back from their Kernel Summit travels etc. But happily, it's not *much* larger than rc2 was, and there's nothing particularly odd going on, so I'm going to just ignore the whole "it's summer" argument, and hope that things are just going that well. Please don't prove me wrong, Linus Read more

Revisiting How We Put Together Linux Systems

Traditional Linux distributions are built around packaging systems like RPM or dpkg, and an organization model where upstream developers and downstream packagers are relatively clearly separated: an upstream developer writes code, and puts it somewhere online, in a tarball. A packager than grabs it and turns it into RPMs/DEBs. The user then grabs these RPMs/DEBs and installs them locally on the system. For a variety of uses this is a fantastic scheme: users have a large selection of readily packaged software available, in mostly uniform packaging, from a single source they can trust. In this scheme the distribution vets all software it packages, and as long as the user trusts the distribution all should be good. The distribution takes the responsibility of ensuring the software is not malicious, of timely fixing security problems and helping the user if something is wrong. Read more

See How Your Linux System Performs Against The Latest Intel/AMD CPUs

This holiday weekend (in the US) can be a great time to test your Linux system to see how it's performing against the latest AMD and Intel processors to see if it's time for a good upgrade. This weekend I'm working on many Linux CPU benchmarks for the upcoming Linux review of the Intel Core i7 5960X Haswell-E system (still waiting for Intel's review sample to arrive though...) and also have some other hardware in preparation for an unrelated launch that's happening next week from another vendor. I'm testing several different Intel/AMD CPUs from the latest desktop CPUs to the Extreme Edition models to some slightly older parts. Beyond the raw performance results are also the power consumption data and much more. Read more