For of you that run a server powered by Fedora or another distribution that’s based on it, here’s a very good SELinux tutorial from Major Hayden, a Rackspace employee. It begins thus: I’ve decided to start a series of posts called “Chronicles of SELinux” where I hope to educate more users on how to handle SELinux denials with finesse rather […]
Post Tagged with: "security"
If you have never heard of or used John the Ripper, then you most likely have not heard of or used Johnny either. So, what, or who, is Johnny? Well, Johnny is not a who, more like a what. What Johnny is, is a graphical interface to John the Ripper, which is a very powerful and cross-platform password cracking tool […]
Linux Deepin is a desktop distribution based on Ubuntu Desktop that was recently added and reviewed on this website. (See Linux Deepin 11.12.1 review.) It uses a heavily modified GNOME 3 desktop, and though it is based on Ubuntu, a new installation of Linux Deepin 11.12.1 does not have any of the network security applications that you find on Ubuntu […]
If you think that the encryption keys that your smart phone or tablet computer uses to protect data you want to keep others from accessing is secure, well … think again. Crypto researchers have demonstrated that those encryption keys can be stolen using techniques that are not that difficult to assemble. Because I am very security conscious and like to […]
A packet filtering firewall, designed to regulate incoming and outgoing packets from a network or an operating system, is akin to security personnel guarding the entrance to a commercial or residential property. Such a system has very little authority, unless given additional powers, in what applications inside the operating system or network are able to do. That is where an […]
The FBI’s apparent desire to require all communications service providers to design a means for law enforcement to access encrypted communications in plain text could have negative effects on personal privacy and industry innovation. Computer scientists, however, concentrate on a different concern: the danger that such design mandates could harm cybersecurity. In an ironic twist, the FBI’s well-intentioned attempt to […]