January 17, 2012 Added by:Bill Gerneglia
There are Linux distributions dedicated to multimedia editing, monitoring, security testing, and basic system administration. Here are some specialized open source Linux distributions that can be used by the IT admins to perform their job with some free sophisticated tools...
January 15, 2012 Added by:Dan Dieterle
Ubuntu has received some stiff competition from Linux Mint. Distrowatch shows that Linux Mint has been the most popular Linux distribution over the last year, and it comes with the firewall graphical user interface installed...
December 27, 2011 Added by:Electronic Frontier Foundation
When security flaw was discovered when iPhone’s web browser opened PDF files, Apple was slow to patch it. Users who didn’t want to wait for the fix had a better way to protect themselves: jailbreak their phones to install an “unauthorized” patch created by an independent developer...
November 18, 2011 Added by:Dan Dieterle
If you look at the user list there is a new user present – “Guest Session”. There is no security on this account. Just select “Guest Session”, leave the password blank and log in. It is an opening, a small crack. And where there is a crack, there is an opportunity for exploit...
October 07, 2011 Added by:Tom Eston
OS X Lion's new feature poses a security risk. When an OS X laptop joins a network which contains a captive portal, a window is automatically opened to prompt the user to interact with it. This presents a major security risk if an attacker can control this functionality...
September 25, 2011 Added by:Jamie Adams
This simple real-world example demonstrates how MAC rules supersede DAC settings. I encourage you to read the system documentation and experiment on lab systems. Too often system administrators become frustrated by "AVC Denial" messages and resort to disabling this enhanced security...
September 22, 2011 Added by:Jamie Adams
SELinux is an enhancement to the standard kernel that provides fine-grained security MAC rules. The Targeted policy provides security for commonly used daemons such as httpd, dhcpd, mailman, named, portmap, nscd, ntpd, portmap, mysqld, postgres, squid, syslogd, winbind, and ypbind...
September 21, 2011 Added by:Robert Siciliano
Has your computer refused to turn on? Or turned on, but only to display a blue screen? The worst is when you’ve been working on a document and your hard drive crashes. If this has yet to happen to you, you’re likely overdue. The following are signs your computer may be close to death...
August 18, 2011 Added by:Jamie Adams
The generic UNIX STIG supported numerous UNIX and Linux distributions but never addressed Red Hat Enterprise Linux 5. For many years, this lack of support was a source of frustration for system administrators. I've completed my initial review and I want to share some of my findings and tips...
July 11, 2011 Added by:Jamie Adams
Few people understand how audit records are generated or the difference between a kernel level audit trail and an application event log. It is critical to configure auditing and logging mechanisms to capture the right data to safeguard the data to prevent it from being modified...
June 27, 2011 Added by:Jamie Adams
When I first heard ridiculous-sounding terms like smurf attack, fraggle attack, Tribal Flood Network (TFN), Trinoo, TFN2K, and stacheldraht, I didn't take them too seriously for a couple of reasons — I worked mainly on non-Internet facing systems, and I was never a victim...
June 24, 2011 Added by:Danny Lieberman
The combination of large numbers of software vulnerabilities, user lock in created by integrating applications with Windows, complexity of Microsoft products and their code and Microsoft predatory trade practices are diametrically different than Linux and the FOSS movement...
June 02, 2011 Added by:Lee Munson
If you are a computer security consultant, there is no better tool to use than Backtrack. If you own a company that has to store important data, then it is vital for you to have a tool like this so your security people can test your network with the same tools the bad guys are using...
April 06, 2011 Added by:Headlines
“All these Windows boxes will default connect to the evil router instead of the legitimate router when this parasitic overlay is running. If Microsoft didn't have that configuration by default, it would negate a lot of the effects of the attack..."
April 06, 2011 Added by:Headlines
There is more than a touch of irony to the notion that a "jailbroken" PlaySation3 running an unsanctioned Linux operating system, the very impetus for the legal action brought by Sony against Hotz and Egorenkov, would be employed in a DDoS attack against Sony domains...
Hacker to Release Symantec's PCAnywhere Sour... Kajal Singh on 04-21-2015
Financial Malware Fell in 2014 As Takedown O... Kajal Singh on 04-21-2015
Weaknesses in Air Traffic Control Systems ar... Kajal Singh on 04-21-2015