security

0

System security? What about your DATA!

http://www.fewt.com

It is often said that Linux is more secure than Windows, and for enterprise workloads this tends to be very true. Desktop Linux is a completely different use case, and unfortunately security configuration is sadly way behind (read: non-existent).

Read more »
cutcross's picture
Created by cutcross 14 years 25 weeks ago – Made popular 14 years 25 weeks ago
Category: High End   Tags:
0

Secure Your Server with Denyhosts

http://www.geekride.com

DenyHosts is a tool i use to secure my SSH server from these type of people. Written in python, this tool serves as a very active security guard and helps me to keep my system safe from lots of prying eyes.

Read more »
mmclarkson's picture
Created by mmclarkson 14 years 26 weeks ago – Made popular 14 years 26 weeks ago
Category: High End   Tags:
0

Buck-security - Security scanner for Ubuntu Servers

http://www.ubuntugeek.com

Buck-Security is a security scanner for Debian and Ubuntu Linux. It helps you to harden your system by running some important security checks. For example, it finds world-writable files and directories, setuid and setgid programs, superuser accounts, and installed attack tool packages.

Read more »
Ipela's picture
Created by Ipela 14 years 26 weeks ago – Made popular 14 years 26 weeks ago
Category: High End   Tags:
0

Generic Security Service Library (GSSLib) 1.0.0 release

http://article.gmane.org

GSSLib is an implementation of the Generic Security Service Application Program Interface (GSS-API) in GNU project and licensed under GPLv3. GSS-API is used by network servers to provide security services, for example, GSS can be used to authenticate a client against SMTP or IMAP servers.

Read more »
stargrave's picture
Created by stargrave 14 years 26 weeks ago – Made popular 14 years 26 weeks ago
Category: High End   Tags:
0

Shishi 0.0.43 (release candidate for 1.0.0)

http://lists.gnu.org

Shishi is GNU implementation of the Kerberos 5 network authentication system. Shishi can be used to authenticate users in distributed systems. Current work items include improvements on the server (KDC), integration of initial authentication via OpenPGP using GnuTLS, set-passwd implementation, and a LDAP backend for the Shisa library used in the KDC for information storage.

Read more »
stargrave's picture
Created by stargrave 14 years 26 weeks ago – Made popular 14 years 26 weeks ago
Category: End User   Tags:
0

OpenSSL 1.0.0 released

http://www.mail-archive.com

The OpenSSL project team is pleased to announce the release of version 1.0.0 of our open source toolkit for SSL/TLS. This new OpenSSL version is a major release and incorporates many new features as well as major fixes compared to 0.9.8n.

Read more »
stargrave's picture
Created by stargrave 14 years 26 weeks ago – Made popular 14 years 26 weeks ago
Category: End User   Tags:
0

Removable disk encryption with dm-crypt/LUKS

http://segfault.in

dm-crypt is a device-mapper target that provides transparent encryption of block devices using the new Linux 2.6 cryptoapi.

Read more »
vinodvm's picture
Created by vinodvm 14 years 27 weeks ago – Made popular 14 years 27 weeks ago
Category: Beginner   Tags:
0

Got Security? You're in Denial

http://www.linux-mag.com

Do you think your systems are secure? Install DenyHosts and you’ll realize that you were in denial.

Read more »
davelong's picture
Created by davelong 14 years 28 weeks ago – Made popular 14 years 28 weeks ago
Category: High End   Tags:
0

Get SheevaPlug!

http://www.openplug.org

Eban Moglen suggests this ARM-based, GNU/Linux device as a networking solution to the troubled times now facing the Free Internet. Communicate with networking friends with greater security. See interview below.

Read more »
lozz's picture
Created by lozz 14 years 28 weeks ago – Made popular 14 years 28 weeks ago
Category: End User   Tags:
0

Kernel Log: Stable kernels analysed, Linux without firmware, new graphics drivers

http://www.h-online.com

The development of Linux 2.6.34 has started and is causing heated discussions on the LKML. LWN.net has analysed Linux 2.6.32.9 for security fixes and found almost twenty of them. Linux-Libre removes proprietary files from the kernel, and new graphics drivers for Radeon cards offer numerous improvements

Read more »
australianrose's picture
Created by australianrose 14 years 29 weeks ago – Made popular 14 years 29 weeks ago
Category: High End   Tags:
0

Apache bug prompts update advice

http://www.zdnet.com.au

IT security company Sense of Security has discovered a serious bug in Apache's HTTP web server, which could allow a remote attacker to gain complete control of a database.

Read more »
bythicalmeast's picture
Created by bythicalmeast 14 years 29 weeks ago – Made popular 14 years 29 weeks ago
Category: High End   Tags:
0

Designing a Secure Linux System

http://etbe.coker.com.au

So the question is, how do can we most effectively use free software to protect against remote attackers, that means viruses and trojan horses – which includes infected files run from USB devices.

Read more »
Marcin's picture
Created by Marcin 14 years 29 weeks ago – Made popular 14 years 29 weeks ago
Category: Beginner   Tags:
0

RSA Authentication Weakness Discovered

http://www.net-security.org

The most common digital security technique used to protect both media copyright and Internet communications has a major weakness, University of Michigan computer scientists have discovered.

Read more »
prakash's picture
Created by prakash 14 years 30 weeks ago – Made popular 14 years 30 weeks ago
Category: High End   Tags:
0

sudo vulnerabilities

http://www.ubuntugeek.com

A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 8.10 Ubuntu 9.04 Ubuntu 9.10

Read more »
mick's picture
Created by mick 14 years 30 weeks ago – Made popular 14 years 30 weeks ago
Category: High End   Tags:
0

The Perils of Sudo With User Passwords

http://www.longitudetech.com

The consensus among new Unix and Linux users seems to be that sudo is more secure than using the root account, because it requires you type your password to perform potentially harmful actions. In reality, a compromised user account, which is no big deal normally, is instantly root in most setups.

Read more »
fossfreak's picture
Created by fossfreak 14 years 31 weeks ago – Made popular 14 years 31 weeks ago
Category: End User   Tags:

Best karma users