Linux security considerations to lock down a shared server.

SSH keysVirtual Private NetworkUse sudo instead of suVulnerability updatesLogin failure delayIptablesPasswords Securing a Linux server is very important. There are many attacks against UNIX servers and the security of corporate networks must be protected by many layered security devices and comprehensive security plans to deal with any problems experienced by network administrators due to a … Read more

Macintosh OSX Sierra vulnerable to a moronic security bug.

The Macintosh Sierra operating system from Apple is vulnerable to a moronic security vulnerability. The user only needs to open a username/password prompt that requires elevation to perform a task and then enter the username ‘root’ and leave the password field blank. Then just click unlock twice, and the user will be granted root access … Read more

Internet security tips for staying safe online in a modern world.

SSH keysVirtual Private NetworkUse sudo instead of suVulnerability updatesLogin failure delayIptablesPasswordsSecurity tips for staying safe online—Start of medium level security——Measures that cost money——Start of physical access measures——Start of high level security——Start of deterrent measures—Further reading Security tips for staying safe online Level 1: Avoid using your real name online and avoid giving away any personal … Read more

Why you should secure your WIFI access point. This is important.

Computer security in the modern world depends upon many factors. One of them is the security of your wireless access point. Some people have access points that have a weak password. This means that a malicious computer user with a Linux machine running aircrack can access your WIFI by cracking the passphrase and then accessing … Read more

Useful TOR hidden links for studying computer security.

Cryptoparty handbook. http://crypty22ijtotell.onion/handbook/index.html. A book about keeping safe online and maintaining anonymity if required. Soylent news. Slashdot styled news website. http://7rmath4ro2of2a42.onion/. NetSec WIKI page. http://netsec7moavvkprc.onion/Main_Page. My Secret World Tech blog. http://32avzir6unmcg2y2.onion/. Debconf Annual Debian conference website. http://gmi5gld3uk5ozvrv.onion/. CyberGuerrilla Anonymous Nexus. http://lu4qfnnkbnduxurt.onion/. Anynymous and secure communication options for the TOR network. The Debian GNU/Linux FAQ. Frequently … Read more

Libarchive Security Flaw Discovered

When it comes to security, everyone knows you shouldn’t run executable
files from an untrustworthy source. Back in the late 1990s, when web
users were a little more naive, it was quite common to receive infected
email messages with fake attachments.
more>>

Linux just as important as ever in the modern world.

Windows 10 is the current operating system that Microsoft are pimping, but Linux is still very important. Servers run the free operating system, and there are many jobs that require Linux administration experience. The Windows 10 bash shell cannot run server software such as Apache and MySQL, this means that an actual Linux machine is … Read more

Linux Mint security breach cause for much discussion.

The recent security breach on the Linux Mint website shows that updating a WordPress website regularly is very important. This breach allowed malicious attackers to compromise the Mint website and change download links to point to Linux Mint ISO images that contained extra files. Therefore, the people using these ISO`s would have been using a … Read more

How to scan your Kali Linux system for security vulnerabilities using the lynis tool.

The lynis tool for Kali Linux allows you to scan your computer system for security vulnerabilities. Execute this command as root and this will allow you to find out if you have any problems with your installation. root@kali:/home/homer# lynis –check-all   [ Lynis 1.4.1 ]   ################################################################################ Lynis comes with ABSOLUTELY NO WARRANTY. This is … Read more

Apple iPhone 5 fingerprint security broken 24 hours after the German release.

The new fingerprint recognition security on the new iPhone 5 has aready been broken. This attack required quite sophisticated hardware and a high level of knowledge; but this shows that no level of security is infallible. The new phone is getting quite a lot of press attention discussing the ins and outs of the new … Read more

Logging into an Ubuntu Server 12.04 machine over the network with Windows 7 or Vista.

Using the Putty application to log into an Ubuntu server is very easy; simply download Putty from here: PuTTY download site and then run the executable which will be in your Users\Downloads folder in Windows 7. Then enter the IP address and port used by SSH on the remote server. The default is 22. Then … Read more

Examples of the worst passwords that are currently in use around the world.

These are the most commonly used passwords that users all over the world currently use. It is not too hard to generate a better password using multiple combinations of upper and lower case letters and numbers coupled with other characters. This will help you create a proper password that will keep your data safe. Most … Read more

Pirate bay gone and Windows and Macintosh security concerns. Linux wins on that front.

The recent raid that took down the Wikileaks and Piratebay websites could be a sign of things to come. The SOPA and SIPA bills that Congress tried to pass through as well as the ACTA bill are about stopping the sharing of copyrighted material; but other things such as the demonization of social media in … Read more

Running old games in Virtualbox and thoughts on Windows ‘Security’ versus Linux.

The ATI Radeon graphics card I have is working rather well when I have the drivers installed; but the open-source drivers leave a lot to be desired. I will probably be using the Fedora 17 Linux distribution in the future; I just need to chroot into the Fedora installation and install the fglrx proprietary drivers. … Read more