Language Selection

English French German Italian Portuguese Spanish

Security

Security Leftovers

Filed under
Security

Git Vulnerability Founds and Fixed in All Supported Ubuntu OSes

Filed under
Security
Ubuntu

A Git vulnerability has been identified and repaired in Ubuntu 15.10, Ubuntu 15.04, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS operating systems.

Read more

Security Leftovers (still dominated by grub bug)

Filed under
Security

Canonical Patches Four More Linux Kernel Vulnerabilities in All Supported Ubuntu OSes

Filed under
Security
Ubuntu

After releasing a major kernel update for all supported Ubuntu Linux operating systems a couple of days ago, Canonical announced today, December 20, the availability of new kernel versions for Ubuntu 15.10, 15.04, 14.04 LTS and 12.04 LTS.

Read more

Security Leftovers

Filed under
Security
  • BadWinmail Microsoft Outlook Bug Can Give Attackers Control Over PCs [iophk: "These kinds of bugs have been in Outlook as long as Outlook has been around. This is nothing new. What's needed are fines for people hooking Windows up to the Internet."]

    Just by looking at an email message in Outlook, attackers can now take control over your PC. The good news is that Microsoft has patched the issue, but unless you updated Outlook after December 8, you're still vulnerable to this issue.

    Security researcher Haifei Li discovered this peculiar Outlook bug, which he named BadWinmail. According to a technical report he put together after the vulnerability's discovery, the attack is extremely easy to carry out and does not require any complex interaction from the end user.

  • MacKeeper Leaks 13 Million Mac Owners' Data, Leaves Passwords Open To Easy Cracking

    Researcher Chris Vickery said he uncovered four IP addresses that took him straight to a MongoDB database, containing a range of personal information, including names, email addresses, usernames, password hashes, phone numbers, IP addresses, system information, as well as software licenses and activation codes. All Vickery had to do was look for openly accessible MongoDB databases on the Shodan search tool.

  • Penetration Testing

    Penetration testing, also called pentesting, is an attack method which scans for broad vulnerabilities in networked computers. It is primarily used in professional settings in order to ascertain the status of security in a machine.

  • Exploit Logs You Into Linux Systems After Hitting Backspace 28 Times
  • Insane bug makes it incredibly easy to hack many Linux systems

Security Leftovers

Filed under
Security

Security Leftovers

Filed under
Security

Internet access and privacy with FreedomBox

Filed under
GNU
Server
Security

Recently, I learned about FreedomBox, a personal server that allows you to use the Internet privately or in locations that have bad or no Internet connection. I was visiting Swecha, a non-profit in the Indian city of Hyderabad that is working to bring about social change with the use of free and open source software, as part of the Free Software Movement of India. The FreedomBox is a revolution in itself and a big part of their initiative.

According to the open source operating system Debian wiki page, FreedomBox is a free software stack that is able to host applications like file sharing, shared calendaring, instant messaging, secure voice conference calling, blogs, and wikis. And, it can be installed on one of the supported hardware devices, installed on a standard Debian machine, or deployed on a virtual machine. FreedomBox has the ability to store data and provides secure instant messaging and voice conference calling that works on low bandwidth.

Read more

Security Leftovers

Filed under
Security
  • Vulnerability in popular bootloader puts locked-down Linux computers at risk

    Pressing the backspace key 28 times can bypass the Grub2 bootloader’s password protection and allow a hacker to install malware on a locked-down Linux system.

  • Grub2 Bypassable Without a Password

    The Grub system is pretty common on Linux desktops. Grub stands for GRand Unified Bootloader, and Grub2 is a continuation of its development. For a long time, another bootloader was also used by many distributions, called LiLo, which was short for Linux Loader, and while it is still actively developed, most distributions opt for Grub anymore.

  • Google's Project Zero uncovers critical flaw in FireEye products

    Google's Project Zero security team have uncovered security flaws in FireEye products which could lead to remote code execution and the compromise of full computer systems.

    Tavis Ormandy from the Google Project Zero vulnerability disclosure team said on Tuesday the flaws were serious enough for FireEye to ask for time to fix the problem, which had the potential to allow remote code execution to take place via a wide range of products.

Syndicate content

More in Tux Machines

Linux and Linux Foundation

Upgrading to GNU/Linux

  • 5 reasons to ditch Windows for Linux
  • Payout of $10,000 for Windows 10 update
    Microsoft has agreed to pay a Californian woman $10,000 (£7,500) after an automatic Windows 10 update left her computer unusable. Teri Goldstein said her Windows 7 computer had automatically tried to update itself to Windows 10 without her permission. She said the update had made her machine unstable, leaving her unable to use it to run her business.
  • Microsoft to make saying no to Windows 10 update easier [Ed: thugs and liars from Microsoft suddenly worry about lawsuits?]
  • Forget The Free Update To Slavery. Just say “NO!” To M$.
    GNU/Linux is $FREE as in costing $0 per licence/copy and FREE in permitting you to run, examine, modify and yes, even distribute the software… What more could you want compared to That Other OS which restricts what you can do with the hardware you own (just read the EULA), and make you pay to use your own PC. I recommend Debian GNU/Linux because it has a huge repository of software packages that work together on your system whether it has an ARM or AMD64 CPU. You can install any of them with a bit of typing or click of a mouse. They are all Free Software too.

Leftovers: Software

  • Five tools to enable Linux automation, monitoring and backup
    When it comes to Linux data center tools, there is no shortage of options. For automation, backup and monitoring, consider these five Linux tools first.
  • GnuCash 2.6.13 Open-Source Accounting Software Released, Over 20 Issues Resolved
    Today, June 28, 2016, the GnuCash development team has released yet another maintenance release of their open-source and cross-platform GnuCash 2.6 accounting software. GnuCash 2.6.13 is here as the most advanced version of the money manager applications that runs on GNU/Linux, Mac OS, and Microsoft Windows operating systems, and it arrives three months from the release of the GnuCash 2.6.12 maintenance update to fix a total of 22 issues reported or not by users during all this time.
  • Libav Gets An OpenH264 Decoder Wrapper
    For those still using Libav over FFmpeg, this multimedia library has added a wrapper for OpenH264 decoder support.
  • Ubuntu Ambiance Theme Ported to GTK 3.20, Nautilus 3.20 Is Ready for Yakkety Yak
    Debian and Ubuntu developer Iain Lane writes today on one of the mailing lists of the Ubuntu Linux operating system about the fact that he's been working for the past few weeks on bringing GTK+ 3.20 support to Ubuntu. According to Iain Lane, the latest GTK+ 3.20 GUI toolkit, which is usually shipped by default with the GNOME 3.20 desktop environment, is ready for upload on the Ubuntu software repositories, for Ubuntu Desktop, only that he doesn't mention for which Ubuntu version, so we can only guess that he's talking about Ubuntu 16.10.

OSS in the Back End