Post Tagged with: "security"

Have you met Johnny?

Have you met Johnny?

If you have never heard of or used John the Ripper, then you most likely have not heard of or used Johnny either. So, what, or who, is Johnny? Well, Johnny is not a who, more like a what. What Johnny is, is a graphical interface to John the Ripper, which is a very powerful and cross-platform password cracking tool […]

August 25, 2012 · 4 comments · Tutorials/Tips
How to install and configure Gufw on Linux Deepin 11.12.1

How to install and configure Gufw on Linux Deepin 11.12.1

Linux Deepin is a desktop distribution based on Ubuntu Desktop that was recently added and reviewed on this website. (See Linux Deepin 11.12.1 review.) It uses a heavily modified GNOME 3 desktop, and though it is based on Ubuntu, a new installation of Linux Deepin 11.12.1 does not have any of the network security applications that you find on Ubuntu […]

March 7, 2012 · 3 comments · Deepin, Tutorials/Tips

He can steal your smart phone’s and tablet’s encryption keys

If you think that the encryption keys that your smart phone or tablet computer uses to protect data you want to keep others from accessing is secure, well … think again. Crypto researchers have demonstrated that those encryption keys can be stolen using techniques that are not that difficult to assemble. Because I am very security conscious and like to […]

March 6, 2012 · 3 comments · Commentary
3 application-level “firewalls” for Linux distributions

3 application-level “firewalls” for Linux distributions

A packet filtering firewall, designed to regulate incoming and outgoing packets from a network or an operating system, is akin to security personnel guarding the entrance to a commercial or residential property. Such a system has very little authority, unless given additional powers, in what applications inside the operating system or network are able to do. That is where an […]

December 6, 2011 · 11 comments · Tutorials/Tips

The FBI and Service Provider Wiretapping, or What’s In Your Wallet?

The FBI’s apparent desire to require all communications service providers to design a means for law enforcement to access encrypted communications in plain text could have negative effects on personal privacy and industry innovation. Computer scientists, however, concentrate on a different concern: the danger that such design mandates could harm cybersecurity.  In an ironic twist, the FBI’s well-intentioned attempt to […]

November 16, 2010 · 1 comment · Commentary
How to password-protect GRUB

How to password-protect GRUB

Password-protecting the bootloader is one method you may employ to enhance the physical security profile of your computer. GRUB, the GRand Unified Bootloader, is the default bootloader on virtually all Linux distributions, but on a significant number, the installer does not have support for setting a GRUB password. This article presents the step involved in password-enabling GRUB – on a […]

September 29, 2010 · 6 comments · Tutorials/Tips