Skip to main content

Home/ Future of the Web/ Group items matching "Software,open" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Gonzalo San Gil, PhD.

Siege Your Servers! | Linux Journal - 0 views

  •  
    # ! (#FreeSoftware) #Security for these#troubled #times... "May 12, 2014 By Shawn Powers in Tech Tips Web Development Setting up Web servers is fairly simple. In fact, it's so simple that once the server is set up, we often don't think about it anymore. It wasn't until I had a very large Web site rollout fail miserably that I started to research a method for load-testing servers before releasing a Web site to production."
  •  
    "May 12, 2014 By Shawn Powers in Tech Tips Web Development Setting up Web servers is fairly simple. In fact, it's so simple that once the server is set up, we often don't think about it anymore. It wasn't until I had a very large Web site rollout fail miserably that I started to research a method for load-testing servers before releasing a Web site to production."
Paul Merrell

How to Encrypt the Entire Web for Free - The Intercept - 0 views

  • If we’ve learned one thing from the Snowden revelations, it’s that what can be spied on will be spied on. Since the advent of what used to be known as the World Wide Web, it has been a relatively simple matter for network attackers—whether it’s the NSA, Chinese intelligence, your employer, your university, abusive partners, or teenage hackers on the same public WiFi as you—to spy on almost everything you do online. HTTPS, the technology that encrypts traffic between browsers and websites, fixes this problem—anyone listening in on that stream of data between you and, say, your Gmail window or bank’s web site would get nothing but useless random characters—but is woefully under-used. The ambitious new non-profit Let’s Encrypt aims to make the process of deploying HTTPS not only fast, simple, and free, but completely automatic. If it succeeds, the project will render vast regions of the internet invisible to prying eyes.
  • Encryption also prevents attackers from tampering with or impersonating legitimate websites. For example, the Chinese government censors specific pages on Wikipedia, the FBI impersonated The Seattle Times to get a suspect to click on a malicious link, and Verizon and AT&T injected tracking tokens into mobile traffic without user consent. HTTPS goes a long way in preventing these sorts of attacks. And of course there’s the NSA, which relies on the limited adoption of HTTPS to continue to spy on the entire internet with impunity. If companies want to do one thing to meaningfully protect their customers from surveillance, it should be enabling encryption on their websites by default.
  • Let’s Encrypt, which was announced this week but won’t be ready to use until the second quarter of 2015, describes itself as “a free, automated, and open certificate authority (CA), run for the public’s benefit.” It’s the product of years of work from engineers at Mozilla, Cisco, Akamai, Electronic Frontier Foundation, IdenTrust, and researchers at the University of Michigan. (Disclosure: I used to work for the Electronic Frontier Foundation, and I was aware of Let’s Encrypt while it was being developed.) If Let’s Encrypt works as advertised, deploying HTTPS correctly and using all of the best practices will be one of the simplest parts of running a website. All it will take is running a command. Currently, HTTPS requires jumping through a variety of complicated hoops that certificate authorities insist on in order prove ownership of domain names. Let’s Encrypt automates this task in seconds, without requiring any human intervention, and at no cost.
  • ...2 more annotations...
  • The benefits of using HTTPS are obvious when you think about protecting secret information you send over the internet, like passwords and credit card numbers. It also helps protect information like what you search for in Google, what articles you read, what prescription medicine you take, and messages you send to colleagues, friends, and family from being monitored by hackers or authorities. But there are less obvious benefits as well. Websites that don’t use HTTPS are vulnerable to “session hijacking,” where attackers can take over your account even if they don’t know your password. When you download software without encryption, sophisticated attackers can secretly replace the download with malware that hacks your computer as soon as you try installing it.
  • The transition to a fully encrypted web won’t be immediate. After Let’s Encrypt is available to the public in 2015, each website will have to actually use it to switch over. And major web hosting companies also need to hop on board for their customers to be able to take advantage of it. If hosting companies start work now to integrate Let’s Encrypt into their services, they could offer HTTPS hosting by default at no extra cost to all their customers by the time it launches.
  •  
    Don't miss the video. And if you have a web site, urge your host service to begin preparing for Let's Encrypt. (See video on why it's good for them.)
Gonzalo San Gil, PhD.

NSA - NoScript Anywhere - Next Generation Mobile NoScript for Android Smartphones and Tablets - 0 views

  •  
    "What's NoScript Mobile UI NoScript Anywhere (NSA) is the nickname for the next major iteration of the NoScript security add-on (NoScript 3.x), whose guts have been turned upside down in order to match Mozilla's Electrolysis multiprocessing architecture and implement a porting for Firefox Mobile, available on Android smartphones and tablets. " [# ! The Acronym... # ! ... it's just a coincidence... # ! ;) # ! The #App is #security for #Your (#opensource driven) #device...]
  •  
    "What's NoScript Mobile UI NoScript Anywhere (NSA) is the nickname for the next major iteration of the NoScript security add-on (NoScript 3.x), whose guts have been turned upside down in order to match Mozilla's Electrolysis multiprocessing architecture and implement a porting for Firefox Mobile, available on Android smartphones and tablets. "
Gonzalo San Gil, PhD.

9 Linux distros to watch in 2015 | inforworld.com - 0 views

  •  
    "Looking ahead Predictions are fun. We all enjoy tech predictions at the beginning of each year. This isn't that. This is a list of the nine Linux distributions that I feel will be the most interesting to watch during 2015. "
  •  
    "Looking ahead Predictions are fun. We all enjoy tech predictions at the beginning of each year. This isn't that. This is a list of the nine Linux distributions that I feel will be the most interesting to watch during 2015. "
Gonzalo San Gil, PhD.

Install Google Chrome on Fedora 21/20, CentOS/RHEL 7 | If Not True Then False - 0 views

  •  
    "This guide explains howto install Google Chrome Web browser on Fedora 21/20/19/18 and CentOS/Red Hat (RHEL) 7. Best way to install and keep up-to-date with Google Chrome browser is use Google's own YUM repository."
Gonzalo San Gil, PhD.

mjg59 | Why improving kernel security is important - 0 views

  •  
    "Nov. 6th, 2015 12:48 am mjg59 The Washington Post published an article today which describes the ongoing tension between the security community and Linux kernel developers. This has been roundly denounced as FUD, with Rob Graham going so far as to claim that nobody ever attacks the kernel. Unfortunately he's entirely and demonstrably wrong, it's not FUD and the state of security in the kernel is currently far short of where it should be."
Gonzalo San Gil, PhD.

The kernel of the argument over Linux's vulnerabilities | The Washington Post - 0 views

  •  
    "Fast, flexible and free, Linux is taking over the online world. But there is growing unease about security weaknesses."
Gonzalo San Gil, PhD.

Linux Security - How Can Your Linux Be Hacked Using Malware, Trojans, Worms, Web Scripts Etc. - LinuxAndUbuntu - 0 views

  •  
    " Is it possible that Linux can be infected with viruses? Probably, you heard of this in some debates. But here are some facts that you need to know to better understand how Linux is secured and what things can damage a Linux system. See how "
Gonzalo San Gil, PhD.

Microsoft keeps pushing Windows 10 upgrades without users' permission - 0 views

  •  
    "Microsoft says its most recent attempt to force older systems to upgrade to Windows 10 was caused by a bug in the Windows Update utility."
Gonzalo San Gil, PhD.

Linux kernel flaw endangers millions of PCs, servers and Android devices | ITworld - 0 views

  •  
    "By Lucian Constantin Follow IDG News Service | January 19, 2016 RELATED TOPICS Security Linux Comments For almost three years, a serious vulnerability in the Linux kernel could have allowed attackers to take full control over Linux-based PCs, servers, Android phones and other embedded devices."
Gonzalo San Gil, PhD.

Getting started with SaltStack - 0 views

  •  
    "I came across Salt while searching for an alternative to Puppet. I like puppet, but I am falling in love with Salt :). This maybe a personal opinion but I found Salt easier to configure and get started with as compared to Puppet. Another reason I like Salt is that it let's you manage your server configurations from the command line, for example:"
Gonzalo San Gil, PhD.

LKML: Linus Torvalds: Linux 4.5-rc2 - 0 views

  •  
    "Date Sun, 31 Jan 2016 18:28:33 -0800 Subject Linux 4.5-rc2 From Linus Torvalds <> As late as Friday, I was planning on talking about how nice it is to see this new trend of tiny rc2 releases, because there really hadn't been very many pull requests at all."
Gonzalo San Gil, PhD.

Linux: Breakfast of Champions | ZDNet - 0 views

  •  
    "There are many different flavors of Linux. Pull up a chair and let me dish you out some of my home-cooking."
  •  
    "There are many different flavors of Linux. Pull up a chair and let me dish you out some of my home-cooking."
Gonzalo San Gil, PhD.

A World Without Linux Would Mean a World Without Our Favorite Movies - 0 views

  •  
    "World Without Linux Episode Ep. 4: Avatar Reimagined OK guys, the fourth episode of the World Without Linux animated series created by Amelia Lorenz, a beautiful and talented graphic artist working for Disney, has just been published online on Linux Foundation's YouTube channel."
Gonzalo San Gil, PhD.

How to block network traffic by country on Linux - Xmodulo - 0 views

  •  
    "Last updated on December 11, 2015 Authored by Dan Nanni 10 Comments As a system admin who maintains production Linux servers, there are circumstances where you need to selectively block or allow network traffic based on geographic locations. For example, you "
Gonzalo San Gil, PhD.

Linux Kernel 4.2.4 Is Now Available for Download, Has Hundreds of Changes - Softpedia - 0 views

  •  
    "All users of the Linux 4.2 kernel must upgrade It looks like it's still October 22 in some countries, so Greg Kroah-Hartman announced just a few minutes ago the immediate availability for download of the fourth maintenance release of Linux kernel 4.2."
  •  
    "All users of the Linux 4.2 kernel must upgrade It looks like it's still October 22 in some countries, so Greg Kroah-Hartman announced just a few minutes ago the immediate availability for download of the fourth maintenance release of Linux kernel 4.2."
Gonzalo San Gil, PhD.

Cracking Linux with the backspace key? [LWN.net] - 0 views

  •  
    "Anybody who has been paying attention to the net over the last week or so will certainly have noticed an abundance of articles with titles like "How to hack any Linux machine just using backspace". All this press does indeed highlight an important vulnerability, but it may not be the one that they think they are talking about."
  •  
    "Anybody who has been paying attention to the net over the last week or so will certainly have noticed an abundance of articles with titles like "How to hack any Linux machine just using backspace". All this press does indeed highlight an important vulnerability, but it may not be the one that they think they are talking about."
Gonzalo San Gil, PhD.

[# ! (#Free) #Tech:] Manage your Linux Box with htop - Freedom Penguin - 0 views

  •  
    "January 14, 2016 Joe Collins 0 Comment How To There is one application that I simply must have on every Linux system I install and that's htop. It doesn't matter whether it's a virtual machine or installed on hardware. It doesn't matter what distribution it is or whether the system is running a GUI Desktop Environment or not, I gotta have htop. It has become such an integral part of "
  •  
    "January 14, 2016 Joe Collins 0 Comment How To There is one application that I simply must have on every Linux system I install and that's htop. It doesn't matter whether it's a virtual machine or installed on hardware. It doesn't matter what distribution it is or whether the system is running a GUI Desktop Environment or not, I gotta have htop. It has become such an integral part of "
Gonzalo San Gil, PhD.

Server Hardening | Linux Journal - 0 views

  •  
    "Jan 14, 2016 By Greg Bledsoe in HOW-TOs Security Servers SysAdmin Server hardening. The very words conjure up images of tempering soft steel into an unbreakable blade, or taking soft clay and firing it in a kiln, producing a hardened vessel that will last many years. Indeed, server hardening is very much like that"
Paul Merrell

Google Is Constantly Tracking, Even If You Turn Off Device 'Location History' | Zero Hedge - 1 views

  • In but the latest in a continuing saga&nbsp;of&nbsp;big tech tracking and surveillance stories which should serve to convince us all we are&nbsp;living in the beginning phases of a&nbsp;Minority Report&nbsp;style tracking and pansophical "pre-crime" system, it's now confirmed that the world's most powerful tech company and search tool&nbsp;will always find a way to keep your location data. The&nbsp;Associated Press&nbsp;sought the help of Princeton researchers to prove that while Google is clear and upfront about giving App users the ability to turn off or "pause" Location History on their devices, there are other hidden means through which it retains the data.
  • According to the AP report: Google says that will prevent the company from remembering where you’ve been. Google’s&nbsp;support page on the subject&nbsp;states: “You can turn off Location History at any time. With Location History off, the places you go are no longer stored.” That isn’t true. Even with Location History paused, some Google apps automatically&nbsp;store time-stamped location data&nbsp;without asking. For example, Google stores a snapshot of where you are when you merely open its Maps app. Automatic daily weather updates on Android phones pinpoint roughly where you are. And some searches that have nothing to do with location, like “chocolate chip cookies,” or “kids science kits,” pinpoint your precise latitude and longitude — accurate to the square foot — and save it to your Google account. The issue directly affects around two billion people using Google's Android operating software and iPhone users relying on Google maps or a simple search. Among the computer science researchers at Princeton conducting the tests is&nbsp;Jonathan Mayer, who told the AP,&nbsp;“If you’re going to allow users to turn off something called ‘Location History,’ then all the places where you maintain location history should be turned off,” and added,&nbsp;“That seems like a pretty straightforward position to have.”
« First ‹ Previous 241 - 260 of 263 Next ›
Showing 20 items per page