Netcraft's June SSL Survey has found that a significant number of SSL certificates are affected by the Debian OpenSSL vulnerability, including Extended Validation SSL certificates and certificates belonging to banks.
Read more »SSL Certificates Vulnerable to OpenSSL Flaw on Debian
Category: Industry Tags:
- Login to post comments
Wiping your disk drive clean
Everybody who owns a computer will someday need to dispose of a disk drive. Before you do, it is a good idea to cleanse the drive, so no one can read your sensitive information. Deleting files and reformatting is not sufficient; determined effort can still reveal data from a drive even after it appears to be gone.
Read more »Category: End User Tags:
- Login to post comments
Updating Debian keys for the uninterested
Despite having an aversion to configuring and maintaining security and crypto software, I accepted that I had to update my system in response to the recent big Debian security problem. If I can do it, you can do it. Below are my notes, but keep in mind that my security rank is somewhere between ignorant and uninterested.
Read more »- Login to post comments
Installing mod_python and Django on Apache
I’ve recently started learning Django for doing web development, so as part of that, I needed to also learn how to set up Django within mod_python so I could deploy my new Django applications on my server.
Read more »Category: High End Tags:
- Login to post comments
Ubuntu Security Notice another win for Linux.
What is that I say, a win for Linux? Look now that all the nay-sayers, pundits, and critics have had a chance to chime in lets look at the big picture. The openssh vulnerability is not something to take lightly and I’m not it’s just I think allot of noise was made for something I think was handled much better than any Microsoft vulnerability ever has.
Read more »Category: Community Tags:
- Login to post comments
Encrypted Root LVM
This tutorial deals only with how to add an extra encrypted physical volume to a volume group pool containing other encrypted physical volumes. This is typical scenario if, at first, you have set up your encryption at a physical partition level (/dev/sdaX where X is the a number of your partition), then you setup your LVM on top of the encrypted partition.
Read more »Category: High End Tags:
Public Service Announcement to Debian and Ubuntu Users
"... «A weakness has been discovered in the random number generator used by OpenSSL on Debian and Ubuntu systems. As a result of this weakness, certain encryption keys are much more common than they should be, such that an attacker could guess the key through a brute-force attack given minimal knowledge of the system.
Read more »Secure the Hell Out of Your Linux Desktop/Server
Are you paranoid about script kiddies? Crackers? The government? Competing business? Well here's a comprehensive list of howto's and explainers to secure the living hell out of your Linux desktop. Follow this perfectly, and the chances of your system being compromised severely drops
Read more »Category: End User Tags:
- Login to post comments
Study: 70 percent say Red Hat more secure than Windows
The Standish group recently completed an extensive study that examines factors influencing open-source adoption. Based on five years of research and analysis, the report provides intriguing insights into open-source adoption levels and the way that open source is reshaping the software industry.
Read more »Protecting directory trees with gpgdir
gpgdir uses GNU Privacy Guard (GnuPG) to encrypt and decrypt files or a directory tree. You could accomplish the same objective by tarring the filesystem up and then encrypting the tar.gz file with GnuPG, but then you would still have to shred or wipe every file in the original directory tree. With gpgdir the whole tree is encrypted in one command.
Read more »Category: High End Tags:
- Login to post comments
Introduction to Forensics
There are certain aspects to system administration that you can learn only from experience. Computer forensics (among other things the ability to piece together clues from a system to determine how an intruder broke in) can take years or even decades to master. If you have never conducted a forensics analysis on a computer, you might not even know exactly where to start.
Read more »Category: High End Tags:
NSA Guides for Securing Red Hat Enterprise Linux 5
These are some decent guides for securing your Red Hat Linux 5 system provided by the US Government’s NSA. Enjoy
Read more »Category: End User Tags:
- Login to post comments
With Vista Breached, Linux Unbeaten in Hacking Contest
The MacBook Air went first; a tiny Fujitsu laptop running Vista was hacked on the last day of the contest; but it was Linux, running on a Sony Vaio, that remained undefeated as conference organizers ended a three-way computer hacking challenge Friday at the CanSecWest conference. Article and video.
Read more »Category: Industry Tags:
- Login to post comments
Results of the PWN to OWN Competition
You may or may not have heard of it, but the PWN to OWN Competition is an annual competition where hackers get together to try to hack into 3 different machines: a Mac, a Linux box, and a Vista box. So far, the results have been both surprising and unsurprising as well.
Read more »Category: Community Tags:
- Login to post comments
Customize the Update Manager in Ubuntu
One of the great things about using open source software is the frequency with which bugs are fixed, security holes are patched, and new features are added. Ubuntu includes a very convenient update manager but constantly upgrading your system can be a burden. This guide will explain howto customize the manager to run less often, or automatically install updates.
Read more »Category: Beginner Tags:
- Login to post comments