LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 21st, 2014
Linux Security Week: April 7th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Host Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Scan a Windows drive for viruses using Linux  09 March 2010 
Source: gHacks - Posted by Alex   
Recently I came into a client who had a Windows XP machine that contained a nasty little virus that rendered the machine nearly unusable. When the machine would boot the CPU was pegging out at 100%, causing the GUI to be nearly unresponsive.
 
GNOME screen lock ineffective in openSUSE Linux - Update  12 February 2010 
Source: H Security - Posted by Alex   
The screen lock of openSUSE 11.2 can be bypassed by the simplest of means. A reader's report prompted The H's associates at heise Security to investigate. Tests confirmed that a locked desktop session can be unlocked without password by holding down the return key. This causes the GNOME screen saver to crash and unlock the desktop after only a few seconds.
 
Quick and easy Linux security  09 February 2010 
Source: gHacks - Posted by Anthony Pell   
You’ve just set up your Linux desktop. Naturally you want it to be as secure as possible. You’ve heard the rumors that, out of the box, Linux has outstanding security. Is it true? Do you really want to take a chance with that? Most likely not. But what can you do? There are tons of firewall tools you can use (take a look at my article “Build a custom firewall with fwbuilder” for an example). But outside of setting up a firewall on your machine, what can you do to boost the security on your desktop?
 
Scan your Linux machine for viruses with ClamTk  28 January 2010 
Source: gHacks - Posted by Alex   
What do you mean – “scan your Linux machine for viruses”? Linux is immune to viruses right? Well…mostly. Even though a proof of concept virus has been discussed, and nothing has actually made it into the wild…you still have email on your system. Some of that email could easily make its way (by way of forward for example) to another, non-Linux, machine. Because of that alone you should employ a virus scanner on ALL of your machines (Linux, Mac, Windows…)

 
OAuth and OAuth WRAP: defeating the password anti-pattern  19 January 2010 
Source: arsTechnica - Posted by Alex   
The developers behind the OAuth protocol have developed a new variant called OAuth WRAP that is simpler and easier to implement. It's a stop-gap solution that will enable broader OAuth adoption while OAuth 2.0, the next generation of the specification, is devised by a working group that is collaborating through the Internet Engineering Task Force (IETF).
 
How to Hack Password of any Operating System  05 January 2010 
Source: Hungry Hackers - Posted by Alex   
One thing any hacker should know is how to hack into login account of any operating system. Major Operating Systems that are used these days are Windows, Linux and Mac. So today I will show you how to hack into these Operating Systems. Are you curious how easy it is for someone to gain access to your computer? If so, read on to see the technique one might use to figure out your computer password.
 
Malicious PDFs: How to Protect Yourself  04 January 2010 
Source: Security Bits - Posted by Alex   
Thanks to themindgames for submitting this article. Malicious documents were the most commonly encountered exploit via the Web in 2008 and continued to be the most prominently encountered exploit in 2009. This is due to a large number of exploits for programs like Adobe Acrobat and the Microsoft Office suite, the ubiquitous use of documents via the Web and the built-in support into the browser.
 
Learn to use extended file attributes in Linux to boost security  15 December 2009 
Source: Tech Republic - Posted by Alex   
ACLs and extended attributes for files are simple and easy to use in Linux, and can go a long way in securing files. Vincent Danen goes over some of the basic file protection enhancements provided by the Linux kernel.
 
Malicious Linux screensaver proves any OS's biggest vulnerability is sitting in the chair  10 December 2009 
Source: Download Squad - Posted by Alex   
Dig up a post on just about any blog about antivirus programs for Windows, and you'll probably come across at least one comment from a Linux or Mac flexing about how impervious his or her OS is. Which is true, to a point, but your defenses are only as good as the people using them.
 
Remotely Viewing A User’s Web History With CSS  07 December 2009 
Source: The Coffee Desk - Posted by Alex   
Throughout the years, there have been several JavaScript/CSS/VBScript exploits in various browsers (and by “various”, I mean mostly Internet Explorer) that allow a remote site to view a user’s complete web history.
 
<< Start < Prev 4 5 6 Next > End >>

Results 41 - 50 of 815
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Fixing OpenSSL's Heartbleed flaw will take MONTHS, warns Secunia
Even the most secure cloud storage may not be so secure, study finds
Targeted Attack Uses Heartbleed to Hijack VPN Sessions
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.