Microsoft uses aggressive, dishonest marketing to promote proprietary software that interferes with standards
Read more »Microsoft’s Assault on the Web, Rival Web Browsers, and HTML
Category: Opposition Tags:
- Login to post comments
Building a Stealth Firewall
A stealth firewall provides a way to gain access to filtering Internet traffic from a position of stealth. A bridge provides stealth because it does not use an IP Address to function but rather operates at the Layer 2 of the OSI model meaning that without an IP Address the firewall is inaccessible and hidden from all would be attackers.
Read more »Category: High End Tags:
- Login to post comments
Is Security Essentials Microsoft 's answer to Linux 's security record?
One of the areas where Linux really shines is security: you do not really need an antivirus if you are running Linux as an end user. In the Windows world however a good antivirus is almost a requirement as viruses and malwares are commonplace. I have personally seen Windows computers being infected less than an hour after being connected to the internet.
Read more »Does Microsoft Create Security FUD Against Rivals?
Microsoft invents a ‘fix’ for some bogus security bug and ‘Independent Security Evaluator’ heaps praise on Microsoft and talks up the ‘vulnerability’ in Mac OS X and GNU/Linux.
Read more »Category: Opposition Tags:
- Login to post comments
Fedora 11 Includes a Simple Firewall
Firewalls need to be simple and firewalls need to be complex….yes, this is a dilemma of huge consequence. However, Fedora has accomplished both in one firewall. This new option in System/Administration/Firewall provides two layers of set up for the firewall.
Read more »Category: Beginner Tags:
- Login to post comments
Securing PHP
PHP is the most popular scripting language used on the Internet and is a necessary component to many of the blogs and content management systems today. One of the important steps in securing your website is to disable those insecure options that are possible on PHP.
Read more »Category: High End Tags:
- Login to post comments
Store passwords with pwsafe
Secure password storage is a big thing these days, particularly with the (good!) advice of not re-using passwords in more than one place. The thinking behind that is that if someone figures out a password for one service or Web site, they will not be able to re-use that password on other sites and further obtain access to your credentials and services.
Read more »Category: End User Tags:
- Login to post comments
Linux Administrator's Security Guide
- Login to post comments
Don't fall for the monoculture myth
The idea that there's more security in using less popular software is not only false, but a smokescreen to solving the real security issues
Read more »Category: Community Tags:
- Login to post comments
Vista 7 Security “Cannot be Fixed. It’s a Design Problem.”
Yet another vector of compromise found in Vista 7; new damage control and PR dissected
Read more »Category: Opposition Tags:
- Login to post comments
Firefox 3.0.9 security release now available
As part of the Mozilla Corporation’s ongoing security and stability process, Firefox 3.0.9 is now available for Windows, Mac, and Linux users as a free download from getfirefox.com.
Read more »Category: End User Tags:
- Login to post comments
FBI, CIPAV, and the Windows Back Doors Revisited
Category: Government Tags:
- Login to post comments
Do you need to worry about the new /dev/mem rootkit problem?
A new paper was presented in late March about using /dev/mem to inject and hide a rootkit (PDF), and the method has been getting some press, leading to a little concern.
Read more »Category: End User Tags:
- Login to post comments
Who'd Be Responsible for a Linux Conficker?
Whenever the Conficker worm comes up here on OSNews (or any other site for that matter) there are always a number of people who point their fingers towards Redmond, stating that it's their fault Conifcker got out.
Read more »Category: Philosophy Tags:
Your Distro is Insecure: Ubuntu
Ubuntu Server has one of the cleanest and easiest Linux distribution installers. However, in many cases, its designers choose to ignore security in favor of ease-of-use. The result? An install that is not secure by default.
Read more »Category: End User Tags:
- Login to post comments