Securing your Linux server is important to protect your data, intellectual property, and time, from the hands of crackers and hackers. The system administrator is responsible for security Linux box. In this first part of a Linux server security series, I will provide 20 hardening tips for default installation of Linux system.
Read more »Top 20 Linux Server Hardening Security Tips
Category: High End Tags:
- Login to post comments
Gnome Lets Anyone See Your Keyring Passwords
A security hole in Gnome allows anyone to see your keyring passwords without needing to enter so much as a password.
Read more »Category: End User Tags:
- Login to post comments
Now Linux Can Get Viruses Via Wine
I forget who, but some wiseguy stuck a link to site (not linkified so Google doesn't mark me as evil) on his Facebook wall, which reminded me of one reason I love Firefox (and Linux): security.
Read more »Category: High End Tags:
- Login to post comments
WhiteHouse.gov switches to Drupal
Under the open-source model, thousands of people pick it apart simultaneously and increase security. It comes more cheaply than computer coding designed for a single client, such as the Executive Office of the President.
Read more »Category: Government Tags:
GNU/Linux Security: Linux House vs Microsoft House
This is the second article in my series about GNU/Linux security for the GNU/Linux curious and new GNU/Linux user.
Read more »Category: High End Tags:
- Login to post comments
Beware Open Source Encryption
There's nothing like an official letter from the U.S. Department of Commerce's munitions control office to make you choke on your morning coffee. At least that was my response upon receiving such a notice.
Read more »Category: High End Tags:
- Login to post comments
Undocumented vulnerability in `ldd`
The `ldd` utility is more vulnerable than you think. It’s frequently used by programmers and system administrators to determine the dynamic library dependencies of executables. Sounds pretty innocent, right? Wrong! It turns out that running `ldd` on an executable can result in executing arbitrary code. I researched this subject thoroughly and found that it was almost completely undocumented.
Read more »The Role of Windows Security Problems in GNU/Linux Gains
Category: Industry Tags:
- Login to post comments
Novell's threat assessment survey results
According to a self-administered survey, Enterprises are still at risk from common security 'gaps.' Novell today released the first summary of data from its Threat Assessment Tool and the view isn't pretty. The results show that "many enterprises are still highly vulnerable to preventable security threats.
Read more »Ubuntu 9.10: Virtual FTP Users
If you create user accounts on a server, and then allow people to log on to the ftp server under those accounts, there’s a chance that some hacker could find a way out of the chroot jail. That would allow him to access areas of the file system where he has no authorization, and possibly to plant Trojans or other malicious programs.
Read more »Why is it that Linux/Ubuntu is said to be so secure..?
One question for Linux gurus: Why is it that Linux/Ubuntu is said to be so secure..? Is it because simply no viruses are programmed for Linux (like Macs), or is there something special about Linux architecture/core that makes it less vulnerable to attacks..?
Read more »Category: Beginner Tags:
- Login to post comments
Windows unsafe for online banking? Shopping?
More and more experts are beginning to think that the best safe way to shop online or do online banking is to replace Windows with Linux.
Read more »Category: Opposition Tags:
- Login to post comments
Vulnerabilities in several PDF applications
Security holes in numerous PDF applications allow attackers to infect systems with malware. Linux distributor Red Hat has already released new packages for these applications, and other distributors are likely to follow soon.
Read more »Category: End User Tags:
- Login to post comments
Linux Security Notes - AIDE File Integrity
AIDE (Advanced Intrusion Detection Enviornment) is a tool to check the file integrity. It is an opensource substitute for TRIPWIRE. It allows to take snapshots of all the major configuration files, binaries as well as libraries stats. It helps to find which binaries have been changed in case of compromisation of the system.
Read more »- Login to post comments
Mozilla Sort of Bans Microsoft
Microsoft has exposed Firefox users to attacks for many months; Mozilla blocks Microsoft's Firefox "leech"
Read more »Category: Opposition Tags:
- Login to post comments