Customer demand is synonymous with technological innovation. Pushing the boundaries of product design, manufacturers continually look to do more – features, functionality and processing power – in less space for less money.
Read more »Does open source software raise security issues?
- Login to post comments
Howto: Setup a Software Firewall in Linux using Firestarter
One of the great features included in Linux is the IPtables firewall. Unfortunately, its command-line use is rather complex, and it can be intimidating for even experienced Linux users to configure it. Firestarter is a friendly graphical interface that allows you to configure a software firewall in Linux using the built-in IPtables/IPchains utilities.
Read more »Category: End User Tags:
- Login to post comments
Debian & APT - Why I love it
I don’t want to say its the best, but I’ve been using Debian, Ubuntu and other APT based Linuxes for years now. Ubuntu on desktop PC’s and Debian on Servers (only because I have a few servers already on Debian and keeping all identical is worth doing). I don’t run GUI’s on my servers.
Read more »Category: High End Tags:
- Login to post comments
Can Mozilla be made more secure?
Window Snyder has the somewhat offbeat title of "chief security something-or-other" at Mozilla, where she is responsible for overseeing efforts to boost the security of the company's open-source offerings, including the Firefox browser.
Read more »Category: High End Tags:
- Login to post comments
Truecrypt 5.0 is out, now with GUI for linux
A new version of Truecrypt is out with a bunch of new features including the ability to encrypt an entire system partition with pre-boot authentication, and finally a GUI for Linux users.
Read more »Category: End User Tags:
- Login to post comments
Howto Delete a File Permanently and Securely in Linux
We all know that when you simply delete a file it's possible to recover it later. Sometimes this is useful, if you accidentally delete something important; but most of the time this is a problem, and you really want that file gone forever. This howto will explain how to delete a file in linux securely and permanently, so it can never be recovered.
Read more »Category: End User Tags:
- Login to post comments
Bruce Schneier on fighting security FUD
Further to the coverage of Bruce Schneier's keynote at linux.conf.au in Melbourne, Australia this week, Schneier sat down with iTnews for this interview where he discusses how the computer security industry must not ignore the impact of fear and other emotions on individual and organisational behaviour.
From the interview: "I can't tell you how much information about security breaches goes undisclosed — often victims don't even know they've been breached. You can call Gartner and they'll give you a number, but it's meaningless. We live in a capitalist society and you can't ask companies to voluntarily do things which are against their interests for the greater good. If they did, their shareholders would sack them."
Read more »Category: Industry Tags:
- Login to post comments
Protect your server with Deny Hosts
Requiring system accessibility via the Internet poses several problems for system administrators. One problem is allowing access by authorized users with the least amount of complexity on the client computer while keeping the system and its services safe from intruders.
Read more »- Login to post comments
FUD Alert! Vista Security Report Card
Microsoft creates FUD as it reports that Windows Vista has logged fewer vulnerabilities in its first year than XP, Red Hat, Ubuntu, and Apple Mac OS X did in their first years.
Read more »Category: Opposition Tags:
- Login to post comments
Protecting against the elusive Linux virus
Estimates vary, but generally it is believed that there are 100 to 500 Linux viruses out there. The tiny number of Linux viruses that do exist have never resulted in a significant outbreak. In comparison to the plethora of viruses and worms in Windows-based platforms, the volume of Linux viruses is insignificant. So this leads us to two questions: why are there so few Linux viruses and are Linux anti-virus tools necessary?
Read more »Category: End User Tags:
- Login to post comments
Securing Linux laptops
Laptop and notebooks are being stolen at an ever-increasing rate. In 2004, Safeware Insurance which sells computer insurance, estimated 600,000 laptop and notebooks a year were being stolen.
Read more »Category: End User Tags:
- Login to post comments
Bullet proof your server #2 - SSH
In the first part of this multi-part tutorial on FOSSwire, I look at some simple ways you can boost your security for the Apache web server. In this part, I’m going to look at securing the OpenSSH server, which is used for remotely logging in to your server.
Read more »Category: High End Tags:
- Login to post comments
2007: That Was a Very Good (Linux) Year
This once I wish I could attach an audio clip to the headline, so that you could hear William Shatner singing "It Was a Very Good Year", just to get into the proper mood.
Read more »Category: Community Tags:
- Login to post comments
iptables as a replacement for commercial enterprise firewalls
With IT budgets getting tighter, managers need to trim costs. Service contracts are expensive for any technology; firewalls are no exception. Netfilter, the project that provides the packet filtering program iptables, is a free firewall alternative. While it lacks the service contract of commercial solutions and a pretty interfaces to make firewall modification easy, it has solid performance, performs effectively at firewalling, and allows for add-on functionality to enhance its reporting and response functions.
Read more »- Login to post comments
Mozilla scoffs at vulnerability study rating IE superior to Firefox
Jeffrey Jones, a researcher and the Security Strategy Director at Microsoft’s Trustworthy Computing group, recently posted a report [in which] Jones came to the conclusion that, contrary to popular belief, Internet Explorer has experienced fewer security vulnerabilities than Firefox over the same periods of time.
Read more »Category: Opposition Tags:
- Login to post comments