Friday, May 16th, 2008
A recently disclosed vulnerability in widely used Linux distributions can be exploited by attackers to guess cryptographic keys, possibly leading to the forgery of digital signatures and theft of confidential information, a noted security researcher said Thursday.
HD Moore, best known as the exploit researcher who created the Metasploit penetration testing ...
Posted in Coding, Internet, Linux, Networking, PHP, Privacy, Software | No Comments
Friday, May 16th, 2008
Sometimes I wonder to myself have I mentioned a certain tool on the site, usually one of my favourites…often I search the site to find I have never posted about it.
It just goes to show how we often overlook some of the more ‘obvious’ choices, and to many people they ...
Posted in Linux, Privacy, Security, Software, Windows | No Comments
Wednesday, May 14th, 2008
Over the weekend, a number of network administrators issued warnings over an order-of-magnitude increase in the number of attempts to guess the username and password of systems running secure shell (SSH), the encrypted access method that replaced the common telnet service. System administrators at universities and some companies have reported ...
Posted in Internet, Linux, Networking, Security, Software | No Comments
Wednesday, May 14th, 2008
The Ubuntu Unleashed blog has an excellent guide to the ins and outs of the Uncomplicated Firewall (ufw), a new feature in Ubuntu Linux 8.04, or Hardy Heron, that makes it easy to control the traffic into and out of your system. While turning on the firewall is as simple ...
Posted in Internet, Linux, Privacy, Security | No Comments
Tuesday, May 13th, 2008
Rootkits are still a security scanner’s worst nightmare: New rootkit detection tests recently conducted by AV-Test.org found that security suites and online Web scanners detected overall only a little more than half of rootkits.
AV-Test.org, an indie security test organization based in Germany, ran two rootkit tests last month, one on ...
Posted in Coding, Hardware, Linux, Networking, Privacy, Security, Software, Windows | No Comments
Page 24 of 30« First«...10...2223242526...30...»Last »