Operating Systems

44fa7dab2a22dc03b6a1de4a35b7834a

Popular Dedicated Linux Distributions and Tools

January 17, 2012 Added by:Bill Gerneglia

There are Linux distributions dedicated to multimedia editing, monitoring, security testing, and basic system administration. Here are some specialized open source Linux distributions that can be used by the IT admins to perform their job with some free sophisticated tools...

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Linux Mint to Take Linux Crown from Ubuntu?

January 15, 2012 Added by:Dan Dieterle

Ubuntu has received some stiff competition from Linux Mint. Distrowatch shows that Linux Mint has been the most popular Linux distribution over the last year, and it comes with the firewall graphical user interface installed...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Why Manufacturers Should Support Jailbreaking

December 27, 2011 Added by:Electronic Frontier Foundation

When security flaw was discovered when iPhone’s web browser opened PDF files, Apple was slow to patch it. Users who didn’t want to wait for the fix had a better way to protect themselves: jailbreak their phones to install an “unauthorized” patch created by an independent developer...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Top Ten Mistakes Made By Linux Developers

December 11, 2011 Added by:Danny Lieberman

My colleague, Dr. Joel Isaacson talks about the top ten mistakes made by Linux developers. It’s a great article and great read from one of the top embedded Linux programmers in the world...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Ubuntu Decreases Security and Calls it a Feature

November 18, 2011 Added by:Dan Dieterle

If you look at the user list there is a new user present – “Guest Session”. There is no security on this account. Just select “Guest Session”, leave the password blank and log in. It is an opening, a small crack. And where there is a crack, there is an opportunity for exploit...

Comments  (1)

53692ae1a8e713373b8a487ce89ee3e2

OS X Lion Captive Portal Hijacking Attack

October 07, 2011 Added by:Tom Eston

OS X Lion's new feature poses a security risk. When an OS X laptop joins a network which contains a captive portal, a window is automatically opened to prompt the user to interact with it. This presents a major security risk if an attacker can control this functionality...

Comments  (1)

4085079c6fe0be2fd371ddbac0c3e7db

MAC versus DAC in SELinux

September 25, 2011 Added by:Jamie Adams

This simple real-world example demonstrates how MAC rules supersede DAC settings. I encourage you to read the system documentation and experiment on lab systems. Too often system administrators become frustrated by "AVC Denial" messages and resort to disabling this enhanced security...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Security-Enhanced Linux Support

September 22, 2011 Added by:Jamie Adams

SELinux is an enhancement to the standard kernel that provides fine-grained security MAC rules. The Targeted policy provides security for commonly used daemons such as httpd, dhcpd, mailman, named, portmap, nscd, ntpd, portmap, mysqld, postgres, squid, syslogd, winbind, and ypbind...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Signals of PC Failure and Contingency Plans

September 21, 2011 Added by:Robert Siciliano

Has your computer refused to turn on? Or turned on, but only to display a blue screen? The worst is when you’ve been working on a document and your hard drive crashes. If this has yet to happen to you, you’re likely overdue. The following are signs your computer may be close to death...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Getting Started with the New Red Hat 5 STIG

August 18, 2011 Added by:Jamie Adams

The generic UNIX STIG supported numerous UNIX and Linux distributions but never addressed Red Hat Enterprise Linux 5. For many years, this lack of support was a source of frustration for system administrators. I've completed my initial review and I want to share some of my findings and tips...

Comments  (2)

4085079c6fe0be2fd371ddbac0c3e7db

What is a Kernel Level Audit Trail?

July 11, 2011 Added by:Jamie Adams

Few people understand how audit records are generated or the difference between a kernel level audit trail and an application event log. It is critical to configure auditing and logging mechanisms to capture the right data to safeguard the data to prevent it from being modified...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Protecting Linux Against DoS/DDoS Attacks

June 27, 2011 Added by:Jamie Adams

When I first heard ridiculous-sounding terms like smurf attack, fraggle attack, Tribal Flood Network (TFN), Trinoo, TFN2K, and stacheldraht, I didn't take them too seriously for a couple of reasons — I worked mainly on non-Internet facing systems, and I was never a victim...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Ban Windows from Embedded Medical Devices

June 24, 2011 Added by:Danny Lieberman

The combination of large numbers of software vulnerabilities, user lock in created by integrating applications with Windows, complexity of Microsoft products and their code and Microsoft predatory trade practices are diametrically different than Linux and the FOSS movement...

Comments  (0)

4ff49873e3fed9a24adf0d37ae00b780

A Review of the New Backtrack 5 Operating System

June 02, 2011 Added by:Lee Munson

If you are a computer security consultant, there is no better tool to use than Backtrack. If you own a company that has to store important data, then it is vital for you to have a tool like this so your security people can test your network with the same tools the bad guys are using...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

MITM Attack Exploits Windows IPv6 Protocols

April 06, 2011 Added by:Headlines

“All these Windows boxes will default connect to the evil router instead of the legitimate router when this parasitic overlay is running. If Microsoft didn't have that configuration by default, it would negate a lot of the effects of the attack..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

PS3 Running Linux Serves Up LOIC in Sony DDoS Attack

April 06, 2011 Added by:Headlines

There is more than a touch of irony to the notion that a "jailbroken" PlaySation3 running an unsanctioned Linux operating system, the very impetus for the legal action brought by Sony against Hotz and Egorenkov, would be employed in a DDoS attack against Sony domains...

Comments  (1)

Page « < 4 - 5 - 6 - 7 - 8 > »