security

0

Microsoft’s Assault on the Web, Rival Web Browsers, and HTML

http://boycottnovell.com

Microsoft uses aggressive, dishonest marketing to promote proprietary software that interferes with standards

Read more »
komrad's picture
Created by komrad 15 years 15 weeks ago – Made popular 15 years 15 weeks ago
Category: Opposition   Tags:
0

Building a Stealth Firewall

http://beginlinux.com

A stealth firewall provides a way to gain access to filtering Internet traffic from a position of stealth. A bridge provides stealth because it does not use an IP Address to function but rather operates at the Layer 2 of the OSI model meaning that without an IP Address the firewall is inaccessible and hidden from all would be attackers.

Read more »
aweber's picture
Created by aweber 15 years 16 weeks ago – Made popular 15 years 16 weeks ago
Category: High End   Tags:
0

Is Security Essentials Microsoft 's answer to Linux 's security record?

http://www.tech-no-media.com

One of the areas where Linux really shines is security: you do not really need an antivirus if you are running Linux as an end user. In the Windows world however a good antivirus is almost a requirement as viruses and malwares are commonplace. I have personally seen Windows computers being infected less than an hour after being connected to the internet.

Read more »
Erlik's picture
Created by Erlik 15 years 16 weeks ago – Made popular 15 years 16 weeks ago
Category: End User   Tags:
0

Does Microsoft Create Security FUD Against Rivals?

http://boycottnovell.com

Microsoft invents a ‘fix’ for some bogus security bug and ‘Independent Security Evaluator’ heaps praise on Microsoft and talks up the ‘vulnerability’ in Mac OS X and GNU/Linux.

Read more »
komrad's picture
Created by komrad 15 years 20 weeks ago – Made popular 15 years 20 weeks ago
Category: Opposition   Tags:
0

Fedora 11 Includes a Simple Firewall

http://easylinuxcds.com

Firewalls need to be simple and firewalls need to be complex….yes, this is a dilemma of huge consequence. However, Fedora has accomplished both in one firewall. This new option in System/Administration/Firewall provides two layers of set up for the firewall.

Read more »
aweber's picture
Created by aweber 15 years 21 weeks ago – Made popular 15 years 21 weeks ago
Category: Beginner   Tags:
0

Securing PHP

http://beginlinux.com

PHP is the most popular scripting language used on the Internet and is a necessary component to many of the blogs and content management systems today. One of the important steps in securing your website is to disable those insecure options that are possible on PHP.

Read more »
aweber's picture
Created by aweber 15 years 21 weeks ago – Made popular 15 years 21 weeks ago
Category: High End   Tags:
0

Store passwords with pwsafe

http://blogs.techrepublic.com.com

Secure password storage is a big thing these days, particularly with the (good!) advice of not re-using passwords in more than one place. The thinking behind that is that if someone figures out a password for one service or Web site, they will not be able to re-use that password on other sites and further obtain access to your credentials and services.

Read more »
Harry Jensen's picture
Created by Harry Jensen 15 years 23 weeks ago – Made popular 15 years 23 weeks ago
Category: End User   Tags:
0

Linux Administrator's Security Guide

http://www.linuxtopia.org

Linux Security Published under the Creative Commons License

Read more »
Noog's picture
Created by Noog 15 years 23 weeks ago – Made popular 15 years 23 weeks ago
Category: High End   Tags:
0

Don't fall for the monoculture myth

http://www.infoworld.com

The idea that there's more security in using less popular software is not only false, but a smokescreen to solving the real security issues

Read more »
Gorossian's picture
Created by Gorossian 15 years 23 weeks ago – Made popular 15 years 23 weeks ago
Category: Community   Tags:
0

Vista 7 Security “Cannot be Fixed. It’s a Design Problem.”

http://boycottnovell.com

Yet another vector of compromise found in Vista 7; new damage control and PR dissected

Read more »
komrad's picture
Created by komrad 15 years 25 weeks ago – Made popular 15 years 25 weeks ago
Category: Opposition   Tags:
0

Firefox 3.0.9 security release now available

https://developer.mozilla.org

As part of the Mozilla Corporation’s ongoing security and stability process, Firefox 3.0.9 is now available for Windows, Mac, and Linux users as a free download from getfirefox.com.

Read more »
partytime's picture
Created by partytime 15 years 25 weeks ago – Made popular 15 years 25 weeks ago
Category: End User   Tags:
0

FBI, CIPAV, and the Windows Back Doors Revisited

http://boycottnovell.com

How (and why) the American secret services rely on Windows

Read more »
komrad's picture
Created by komrad 15 years 25 weeks ago – Made popular 15 years 25 weeks ago
Category: Government   Tags:
0

Do you need to worry about the new /dev/mem rootkit problem?

http://blog.ibeentoubuntu.com

A new paper was presented in late March about using /dev/mem to inject and hide a rootkit (PDF), and the method has been getting some press, leading to a little concern.

Read more »
polbaan's picture
Created by polbaan 15 years 26 weeks ago – Made popular 15 years 26 weeks ago
Category: End User   Tags:
0

Who'd Be Responsible for a Linux Conficker?

http://www.osnews.com

Whenever the Conficker worm comes up here on OSNews (or any other site for that matter) there are always a number of people who point their fingers towards Redmond, stating that it's their fault Conifcker got out.

Read more »
Noog's picture
Created by Noog 15 years 26 weeks ago – Made popular 15 years 26 weeks ago
Category: Philosophy   Tags:
0

Your Distro is Insecure: Ubuntu

http://www.linux-mag.com

Ubuntu Server has one of the cleanest and easiest Linux distribution installers. However, in many cases, its designers choose to ignore security in favor of ease-of-use. The result? An install that is not secure by default.

Read more »
sunny's picture
Created by sunny 15 years 26 weeks ago – Made popular 15 years 26 weeks ago
Category: End User   Tags:

Best karma users