In a recent attack on the web server of the BerliOS (Berlin Open Source) open source platform intruders replaced the portal's home page.
Read more »BerliOS open source project portal falls victim to attack
Category: High End Tags:
- Login to post comments
The most insecure part of your network is...
Sure, It's Secure: "Your desktops' operating systems? Your servers' operating systems? Your firewall? Or..."
Read more »Category: High End Tags:
- Login to post comments
Linux-powered Packet Fence Protects Your Network
Packet Fence bundles many useful and powerful network protection tools into an attractive, integrated package. Such as network access control, monitoring, intrusion detection, VLAN isolation, DHCP fingerprinting, and captive portal. Eric Geier introduces us to this protective powerhouse.
Read more »Category: High End Tags:
- Login to post comments
Restricting SSH logins to specific groups on Ubuntu
On Ubuntu I have a user account "administrator" which is in the admin group. It has a complicated password for security. OpenSSH by default allows all users to attempt to login remotely. Since user accounts often have weak passwords it's unsafe to allow this.
Read more »Category: High End Tags:
- Login to post comments
Open Source doesn't automatically mean safety
The recent Firefox security upgrade introduced me to someone who thought that their old browser was still more secure than others. Sorry. It doesn't work that way.
Read more »- Login to post comments
FSFE Fellowship interview with Simon Josefsson
Simon Josefsson is a Fellow and GNU hacker with a special interest in security. His contributions to the Free Software world include such ubiquitous projects as GnuTLS and Libssh2, and he was recently presented with the Nordic Free Software Award. I sat down for a jabber session with Simon, asking him about his projects and other security matters.
Read more »Category: Community Tags:
- Login to post comments
Learn to use extended file attributes in Linux to boost security
ACLs and extended attributes for files are simple and easy to use in Linux, and can go a long way in securing files. Vincent Danen goes over some of the basic file protection enhancements provided by the Linux kernel.
Read more »Category: High End Tags:
- Login to post comments
Adobe PDF at Risk From Zero-Day Vulnerability
Users of Adobe Reader and Acrobat PDF documents could be risk from a new zero-day vulnerability, with the company saying it has gotten reports that the flaw is currently being exploited in the wild.
Read more »Category: High End Tags:
- Login to post comments
Configuring Strong Wi-Fi (802.1X) Authentication in Linux, Part II
As the weaker forms of wireless encryption fail, migrating to stronger encryption protocols becomes more urgent. Eric Geier shows how to configure Linux clients to use strong encryption to connect to wireless networks.
Read more »Category: High End Tags:
- Login to post comments
Linux Security Kernel Clean-Up
Two significant Linux bugs have been founded and smashed. Here's what you need to know.
Read more »Category: High End Tags:
- Login to post comments
Open source bugs fixed quicker than commercial software
Open-source code is more prone to severe flaws than commercial software, but bugs get fixed more quickly, according to revealing new research from application security firm Veracode.
Read more »Category: Industry Tags:
- Login to post comments
French Army Contributes to Mozilla Thunderbird
The French Gendarmerie Nationale police contributed to the code of the last version of Mozilla Thunderbird with security extensions named "TrustedBird".
Read more »Category: Government Tags:
- Login to post comments
Malware Hidden Inside Screensaver On Gnome-Look
Malware has been found hidden inside an innocuous 'waterfall' screensaver .deb file made available on popular artwork sharing site Gnome-Look.org.
Read more »Category: End User Tags:
- Login to post comments
4 Unreasonable Security Practices You're Probably Following
If you were a police officer and I handed you a bullet-proof vest and told you that it was effective 18 percent of the time or less, how much confidence would you have in the solution?
Read more »Category: High End Tags:
- Login to post comments
Fedora 12 and unprivileged package installation
In short, the problem was that in the Fedora 12 default installation, regular users sitting at the console could install signed packages from any repository that the administrator has enabled.
Read more »Category: High End Tags:
- Login to post comments