It is often said that Linux is more secure than Windows, and for enterprise workloads this tends to be very true. Desktop Linux is a completely different use case, and unfortunately security configuration is sadly way behind (read: non-existent).
Read more »System security? What about your DATA!
Category: High End Tags:
- Login to post comments
Secure Your Server with Denyhosts
DenyHosts is a tool i use to secure my SSH server from these type of people. Written in python, this tool serves as a very active security guard and helps me to keep my system safe from lots of prying eyes.
Read more »Category: High End Tags:
- Login to post comments
Buck-security - Security scanner for Ubuntu Servers
Buck-Security is a security scanner for Debian and Ubuntu Linux. It helps you to harden your system by running some important security checks. For example, it finds world-writable files and directories, setuid and setgid programs, superuser accounts, and installed attack tool packages.
Read more »Generic Security Service Library (GSSLib) 1.0.0 release
GSSLib is an implementation of the Generic Security Service Application Program Interface (GSS-API) in GNU project and licensed under GPLv3. GSS-API is used by network servers to provide security services, for example, GSS can be used to authenticate a client against SMTP or IMAP servers.
Read more »Category: High End Tags:
- Login to post comments
Shishi 0.0.43 (release candidate for 1.0.0)
Shishi is GNU implementation of the Kerberos 5 network authentication system. Shishi can be used to authenticate users in distributed systems. Current work items include improvements on the server (KDC), integration of initial authentication via OpenPGP using GnuTLS, set-passwd implementation, and a LDAP backend for the Shisa library used in the KDC for information storage.
Read more »OpenSSL 1.0.0 released
The OpenSSL project team is pleased to announce the release of version 1.0.0 of our open source toolkit for SSL/TLS. This new OpenSSL version is a major release and incorporates many new features as well as major fixes compared to 0.9.8n.
Read more »Category: End User Tags:
- Login to post comments
Removable disk encryption with dm-crypt/LUKS
dm-crypt is a device-mapper target that provides transparent encryption of block devices using the new Linux 2.6 cryptoapi.
Read more »Category: Beginner Tags:
- Login to post comments
Got Security? You're in Denial
Do you think your systems are secure? Install DenyHosts and you’ll realize that you were in denial.
Read more »Category: High End Tags:
- Login to post comments
Get SheevaPlug!
Eban Moglen suggests this ARM-based, GNU/Linux device as a networking solution to the troubled times now facing the Free Internet. Communicate with networking friends with greater security. See interview below.
Read more »- Login to post comments
Kernel Log: Stable kernels analysed, Linux without firmware, new graphics drivers
The development of Linux 2.6.34 has started and is causing heated discussions on the LKML. LWN.net has analysed Linux 2.6.32.9 for security fixes and found almost twenty of them. Linux-Libre removes proprietary files from the kernel, and new graphics drivers for Radeon cards offer numerous improvements
Read more »Category: High End Tags:
- Login to post comments
Apache bug prompts update advice
IT security company Sense of Security has discovered a serious bug in Apache's HTTP web server, which could allow a remote attacker to gain complete control of a database.
Read more »Category: High End Tags:
- Login to post comments
Designing a Secure Linux System
So the question is, how do can we most effectively use free software to protect against remote attackers, that means viruses and trojan horses – which includes infected files run from USB devices.
Read more »Category: Beginner Tags:
- Login to post comments
RSA Authentication Weakness Discovered
The most common digital security technique used to protect both media copyright and Internet communications has a major weakness, University of Michigan computer scientists have discovered.
Read more »Category: High End Tags:
- Login to post comments
sudo vulnerabilities
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 8.10 Ubuntu 9.04 Ubuntu 9.10
- Login to post comments
The Perils of Sudo With User Passwords
The consensus among new Unix and Linux users seems to be that sudo is more secure than using the root account, because it requires you type your password to perform potentially harmful actions. In reality, a compromised user account, which is no big deal normally, is instantly root in most setups.
Read more »Category: End User Tags:
- Login to post comments