Language Selection

English French German Italian Portuguese Spanish

Security

Securing Your Server With A Host-based Intrusion Detection System

Filed under
Linux
Security
HowTos

This article shows how to install and run OSSEC HIDS, an Open Source Host-based Intrusion Detection System. It performs log analysis, integrity checking, rootkit detection, time-based alerting and active response. It helps you detect attacks, software misuse, policy violations and other forms of inappropriate activities.

How To Combat Viruses Using Your Postfix Configuration

Filed under
Linux
Security
HowTos

In this guide you will learn how to tweak your Postfix/Amavisd setup to give better virus protection. If you want to achieve business grade virus protection you need to do a few small things so that there is less chance of the latest greatest script kiddie invention getting through. Therefore this tutorial shows how to install and use ClamAV, F-Prot, and McAfee UVScan.

Red Hat Champions Security Vulnerabilities Forum

Filed under
Security

Red Hat today announced its continuing commitment to superior security services with a new initiative, implemented by the National Institute of Standards and Technology (NIST), that enables members of the software industry to officially and publicly comment on vulnerabilities.

Reveal The Holes In Your Webserver

Filed under
Software
Security
Web

Nikto is an advanced web vulnerability scanner, which can help you expose the potential holes in your webserver (and thus allow you to fix them before malicious users attempt to exploit them). This guide will show you how to use its advanced scanning features to expose holes in your webserver which you never knew existed!

Disk Encryption Tools for Linux and benchmark results

Filed under
Security

Your computer running Linux somehow ran into a hardware glitch and had to be hauled to the neighborhood Computer service center. And you are asked to leave the machine at the service center and come back after a couple of days so that the technician can have a good look at it. But you are a bit worried because the harddisk contains the blue prints of the most secret project you are currently working on.

OpenOffice hits back at viral risk claims

Filed under
Security

OpenOffice.org has hit back at claims that the alternative office applications suite is riddled with security holes. Researchers at the French Ministry of Defense say that OpenOffice is subject to security weaknesses that make it at least as susceptible to computer viruses as the commercial, more widely used, Microsoft Office.

Researchers: OpenOffice.org Security 'Insufficient'

Filed under
Security

With Microsoft's Office suite now being targeted by hackers, researchers at the French Ministry of Defence say users of the OpenOffice.org software may be at even greater risk from computer viruses.

Defending Against New Rootkits That Beat BSD, Linux, Mac, Vista, AMD and Intel

Filed under
Security

“The idea behind Blue Pill is simple,” says Joanna Rutkowska of invisible things. “Your operating system swallows the Blue Pill and it awakes inside the Matrix.”

Syndicate content

More in Tux Machines

Leftovers: Software

today's howtos

Leftovers: Gaming

AntiMicro 2.6 Yields Greater Compatibility For Gamepads On Linux

AntiMicro continues to be GPLv3 licensed and works not only on Linux but also modern versions of Windows for mapping keyboard/mouse controls to a gamepad. The Linux support though remains dependent upon an X.Org Server and its libraries. Read more