Skip to main content

Home/ Future of the Web/ Group items tagged GNU-linux security

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

Free Software Foundation statement on the GNU Bash "shellshock" vulnerability - Free So... - 0 views

  •  
    "by Free Software Foundation - Published on Sep 25, 2014 04:51 PM A major security vulnerability has been discovered in the free software shell GNU Bash. The most serious issues have already been fixed, and a complete fix is well underway. GNU/Linux distributions are working quickly to release updated packages for their users. All Bash users should upgrade immediately, and audit the list of remote network services running on their systems. " [# ! + http://security.stackexchange.com/questions/68168/is-there-a-short-command-to-test-if-my-server-is-secure-against-the-shellshock-b]
  •  
    "by Free Software Foundation - Published on Sep 25, 2014 04:51 PM A major security vulnerability has been discovered in the free software shell GNU Bash. The most serious issues have already been fixed, and a complete fix is well underway. GNU/Linux distributions are working quickly to release updated packages for their users. All Bash users should upgrade immediately, and audit the list of remote network services running on their systems. "
Gonzalo San Gil, PhD.

Linux Security Guide (extended version) - Linux Audit - 0 views

  •  
    "With so many articles about Linux security on the internet, you may feel overwhelmed by how to properly secure your Linux systems. With this guide, we walk through different steps, tools, and resources. The main goal is to have you make an educated choice on what security defenses to implement on Linux. For this reason, this article won't show any specific configuration values, as it would implicate a possible best value. Instead, related articles and resources will be available in the text. The goal is to make this guide into a go-to article for when you need to secure your Linux installation. If you like this article, help others and share it on your favorite social media channels. Got feedback? Use the comments at the bottom. This document in work in progress and last updated in September 2016"
Gonzalo San Gil, PhD.

Fallo en la biblioteca C de GNU que deja a miles de programas y a Linux desprotegido | ... - 0 views

  •  
    "Más noticias relativas a la seguridad y que salpican a Linux. No han sido los desarrolladores del kernel Linux los que han metido la pata, pero sí los desarrolladores de la biblioteca C del proyecto GNU. "
Gonzalo San Gil, PhD.

An Introduction to SELinux | Linux.com - 0 views

  •  
    "Way back in kernel 2.6, a new security system was introduced to provide a mechanism for supporting access control security policies. This system was Security Enhanced Linux (SELinux) and was introduced by the National Security Administration (NSA) to incorporate a strong Mandatory Access Control architecture into the subsystems of the Linux kernel."
Gonzalo San Gil, PhD.

5 Best Linux Distros for Security - Datamation - 0 views

  •  
    "Linux distros have has long emphasized security and related matters like firewalls, penetration testing, anonymity, and privacy. These distributions pay special attention to security."
Gonzalo San Gil, PhD.

Anonymizing Networks - GNU/Linux - PRISM Break - 0 views

  •  
    "e Recommendations freenet.png Freenet Decentralized censorship-resistant network. gnunet.png GNUnet GNUnet is a fully free P2P network. i2p.png I2P The invisible internet project. syndie.png Syndie Distributed, anonymous forum software. tor.png Tor Free software for enabling online anonymity. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more th… "
Gonzalo San Gil, PhD.

Best Open Source Security Tools of 2015 (and 2016) - Linux Audit - 0 views

  •  
    "lways looking for a better tool to help you in your work? If there is one website who knows what is happening in the field of security tools, it is ToolsWatch. The site covers new tools, and promotes existing projects when they release a new version."
Gonzalo San Gil, PhD.

How to Scan for Rootkits, backdoors and Exploits Using 'Rootkit Hunter' in Linux - 0 views

  •  
    "This article will guide you a way to install and configure RKH (RootKit Hunter) in Linux systems using source code."
Gonzalo San Gil, PhD.

How to block network traffic by country on Linux - Xmodulo - 0 views

  •  
    "Last updated on December 11, 2015 Authored by Dan Nanni 10 Comments As a system admin who maintains production Linux servers, there are circumstances where you need to selectively block or allow network traffic based on geographic locations. For example, you "
Gonzalo San Gil, PhD.

Turn an old smartphone into a home automation gizmo - 1 views

  •  
    "At the recent Embedded Linux Conference and OpenIoT Summit, Mozilla Technical Evangelist Dietrich Ayala proposed a simple and affordable solution to home automation: A discarded smartphone can handle some of the most useful home automation tasks without requiring expensive hubs and sensors - or risking data security in the cloud."
  •  
    "At the recent Embedded Linux Conference and OpenIoT Summit, Mozilla Technical Evangelist Dietrich Ayala proposed a simple and affordable solution to home automation: A discarded smartphone can handle some of the most useful home automation tasks without requiring expensive hubs and sensors - or risking data security in the cloud."
Gonzalo San Gil, PhD.

TOR IS THE NSA [LWN.net, 2008] - 0 views

  •  
    "Posted Jul 9, 2008 21:13 UTC (Wed) by dulles (guest, #45450) Parent article: GNU/Linux free software tools to preserve your online privacy, anonymity and security (FSM)"
Gonzalo San Gil, PhD.

http://www.linux-server-security.com/linux_servers_howtos/linux_monitor_network_nload.html - 0 views

  •  
    "©2016 Chris Binnie On a continually changing network it is often difficult to spot issues due to the amount of noise generated by expected network traffic. Even when communications are seemingly quiet a packet sniffer will display screeds of noisy data. That data might be otherwise unseen broadcast traffic being sent to all hosts willing to listen and respond on a local network. Make no mistake, noise on a network link can cause all sorts of headaches because it can be impossible to identify trends quickly, especially if a host or the network itself is under attack. Packet sniffers will clearly display more traffic for the busiest connections which ultimately obscures the activities of less busy hosts."
  •  
    "©2016 Chris Binnie On a continually changing network it is often difficult to spot issues due to the amount of noise generated by expected network traffic. Even when communications are seemingly quiet a packet sniffer will display screeds of noisy data. That data might be otherwise unseen broadcast traffic being sent to all hosts willing to listen and respond on a local network. Make no mistake, noise on a network link can cause all sorts of headaches because it can be impossible to identify trends quickly, especially if a host or the network itself is under attack. Packet sniffers will clearly display more traffic for the busiest connections which ultimately obscures the activities of less busy hosts."
Gonzalo San Gil, PhD.

Why Facebook Just Launched Its Own 'Dark Web' Site | WIRED [+ TOR IS THE NSA http://lwn... - 2 views

  •  
    "Facebook has never had much of a reputation for letting users hide their identities online. But now the world's least anonymous website has just joined the Web's most anonymous network." [# ! Just a #PR #Campaign… # ! … as, You'll learn soon… TOR IS THE NSA Posted Jul 9, 2008 21:13 UTC (Wed) by dulles (guest, #45450) Parent article: GNU/Linux free software tools to preserve your online privacy, anonymity and security (FSM) # ! Anyway, since long ago, You Must Know that there is no privacy in # ! a Network built by others -Governments and Big Companies # ! among 'em. # ! Don' come to The Web expecting privacy, as You won't look for # ! intimacy in a Stadium Full of Pe@ple… # ! … but meet the places You get in.]
  •  
    "Facebook has never had much of a reputation for letting users hide their identities online. But now the world's least anonymous website has just joined the Web's most anonymous network."
Gonzalo San Gil, PhD.

Total security part 1: online | Linux User & Developer - the Linux and FOSS mag for a G... - 0 views

  •  
    "Get rock-solid defences on your systems and networks Follow @LinuxUserMag This article is a companion piece to our Total Privacy article"
  •  
    "Get rock-solid defences on your systems and networks Follow @LinuxUserMag This article is a companion piece to our Total Privacy article"
Gonzalo San Gil, PhD.

Review: Graylog delivers open source log management for the dedicated do-it-yourselfer ... - 0 views

  •  
    "By Joel Snyder Network World | Nov 9, 2015 3:06 AM PT RELATED TOPICS Open Source Subnet Network Management System Management Comments In most big security breaches, there's a familiar thread: something funny was going on, but no one noticed. The information was in the logs, but no one was looking for it. Logs from the hundreds or thousands of network devices are the secret sauce to problem solving, security alerting, and performance and capacity management. Gathering logs together, analyzing them, "
Gonzalo San Gil, PhD.

Home - FirewallD - 0 views

  •  
    "Welcome to the FirewallD project homepage! FirewallD provides a dynamically managed firewall with support for network/firewall zones to define the trust level of network connections or interfaces. It has support for IPv4, IPv6 firewall settings and for ethernet bridges and has a separation of runtime and permanent configuration options. It also supports an interface for services or applications to add firewall rules directly."
1 - 16 of 16
Showing 20 items per page