LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: October 20th, 2014
Linux Advisory Watch: October 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Linux Events
Setting the record straight on sudo  06 April 2010  Print E-mail
User Rating:      How can I rate this item?
Source: TechRepublic - Posted by Anthony Pell   
Host Security I recently read a blog posting that denounced the use of sudo as insecure because of the following (briefly summed up and paraphrased) reasons:

  1. The idea that not using the root account is wrong, using root for everything is fine.
  2. That using sudo for everything provides a false sense of security over performing an action as root directly
  3. That using a user account password to get a root shell is a bad idea
  4. That using a root shell is not dangerous, and that this “grave misunderstanding” came from the idea that running X as root is dangerous
  5. That sudo has very little place in the Enterprise
  6. That relying on sudo is foolish, because it has bugs
  7. That everything should be done from a root shell, and that you should have to know the “uber-secret root password” to get that access
Read more...
 
System security? What about your DATA!  05 April 2010  Print E-mail
User Rating:      How can I rate this item?
Source: fewt blog - Posted by Anthony Pell   
Host Security What makes this problem worse? Well what about your DATA? Let me start with the statement that there is nothing installed on your Desktop Linux system by default to protect your data from theft or destruction, and there is nothing to protect your computer from harming other computers when you are using Desktop Linux.
Read more...
 
German Government Warns Internet Users On Firefox Security Flaw  23 March 2010  Print E-mail
User Rating:      How can I rate this item?
Source: All Headline News - Posted by Anthony Pell   
Host Security The German government warned its citizens not to use Internet web browser Firefox because of serious security problems. There is reportedly a security flaw in Mozilla Firefox Version 3.6 that could allow a hacker to take control of someone's computer by launching malicious code.
Read more...
 
Thunderbird Secure Connections  18 March 2010  Print E-mail
User Rating:      How can I rate this item?
Source: PostfixMail.com - Posted by Anthony Pell   
Host Security Client configuration can be just as big of problem as the set up for the server. One of the problems is that not all clients, both Linux and Windows, are capable of handling TLS or SMTP AUTH. That is getting better but it is still a problem. One great alternative client is Thunderbird, Icedove if you are on Debian. Here is a step by step approach to setting up the Thunderbird client for TLS and SMTP AUTH.
 
New Internet browser threat sneaks by traditional defenses  17 March 2010  Print E-mail
User Rating:      How can I rate this item?
Source: Network World - Posted by Anthony Pell   
Host Security An undetectable browser exploit that bares corporate networks to attackers tops the list of the most potentially effective new attacks that have been devised by researchers seeking vulnerabilities to take advantage of, according to a study by White Hat Security.
Read more...
 
<< Start < Prev 4 5 6 Next > End >>

Results 37 - 45 of 816
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Pro-Privacy Senator Wyden on Fighting the NSA From Inside the System
NIST to hypervisor admins: secure your systems
Quick PHP patch beats slow research reveal
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.