Came here in search of an answer to a problem, but didn't find it? Visit the forum @ LinuxBSDos.com, pick a category and ask a question.

Post Tagged with: "security"

Have you met Johnny?

Have you met Johnny?

If you have never heard of or used John the Ripper, then you most likely have not heard of or used Johnny either. So, what, or who, is Johnny? Well, Johnny is not a who, more like a what. What Johnny is, is a graphical interface to John the Ripper, which is a very powerful and cross-platform password cracking tool […]

How to install and configure Gufw on Linux Deepin 11.12.1

How to install and configure Gufw on Linux Deepin 11.12.1

Linux Deepin is a desktop distribution based on Ubuntu Desktop that was recently added and reviewed on this website. (See Linux Deepin 11.12.1 review.) It uses a heavily modified GNOME 3 desktop, and though it is based on Ubuntu, a new installation of Linux Deepin 11.12.1 does not have any of the network security applications that you find on Ubuntu […]

He can steal your smart phone’s and tablet’s encryption keys

If you think that the encryption keys that your smart phone or tablet computer uses to protect data you want to keep others from accessing is secure, well … think again. Crypto researchers have demonstrated that those encryption keys can be stolen using techniques that are not that difficult to assemble. Because I am very security conscious and like to […]

3 application-level “firewalls” for Linux distributions

3 application-level “firewalls” for Linux distributions

A packet filtering firewall, designed to regulate incoming and outgoing packets from a network or an operating system, is akin to security personnel guarding the entrance to a commercial or residential property. Such a system has very little authority, unless given additional powers, in what applications inside the operating system or network are able to do. That is where an […]

The FBI and Service Provider Wiretapping, or What’s In Your Wallet?

The FBI’s apparent desire to require all communications service providers to design a means for law enforcement to access encrypted communications in plain text could have negative effects on personal privacy and industry innovation. Computer scientists, however, concentrate on a different concern: the danger that such design mandates could harm cybersecurity.  In an ironic twist, the FBI’s well-intentioned attempt to […]

How to password-protect GRUB

How to password-protect GRUB

Password-protecting the bootloader is one method you may employ to enhance the physical security profile of your computer. GRUB, the GRand Unified Bootloader, is the default bootloader on virtually all Linux distributions, but on a significant number, the installer does not have support for setting a GRUB password. This article presents the step involved in password-enabling GRUB – on a […]

Security features of Linpus Lite 1.4

Security features of Linpus Lite 1.4

Linpus Lite 1.4 is the latest update to the Linux distribution published by Linpus Technologies, Inc. of Taipei, Taiwan. Though designed for use on netbooks and low-power computers, it is one of the best distributions that I have reviewed for publication on this website. It boots up real fast and shuts down even faster. It features a slick installation program […]

What we can learn from Jason Chen’s experience

Not too long ago, Jason Chen, a Gizmodo editor, had all the computer related materials in his residence seized by cops acting on a warrant in relation to Apple’s missing iPhone 4G prototype. If you recall, Jason Chen got hold of the pre-release iPhone from a guy who found it in a California bar. So Jason blogged about it (the […]

3 Problems Cloud Security Certification Can Solve

What if there were widely accepted standards for cloud security and, better yet, a universally recognized designation for “trusted” cloud providers? The basic promise of cloud computing is undeniably appealing: Increase efficiency and reduce cost by taking advantage of flexibly pooled computing resources managed by somebody else. Indeed, as Bill Brenner of CSO put it, “Given how expensive it is […]

Improved Online Security for a Tenth of the Cost

Computer scientists at the University of Hertfordshire have found a way to share information online securely for a fraction of the cost of existing systems. Professors Bruce Christianson and Alex Shafarenko at the University’s School of Computer Science, working in collaboration with Professor Sergei Turitsyn at the University of Aston, have been awarded a UK patent for a fibre optics […]

How to Stop Distant Attacks on RFID Chips

The limited power and processing ability of RFID chips makes them vulnerable to attackers operating at a distance. A new protocol could tackle this problem. One drawback with RFID chips is their inability to know the distance of any device that is interrogating them. That allows a malicious user to attack from a distance, more or less at leisure and […]

Traffic Mining Firewall Logs Could Improve Network Security

A firewall is the safety barrier between a computer network and the outside world. Individuals, companies and large organizations alike rely on a firewall being robust enough to fend off hackers attempting to break into a computer system. However, managing the firewall rules that decide between online friend and foe has proved to be complex, error-prone, expensive, and inefficient for […]

In Networks We Trust

European researchers are proposing a paradigm-shifting solution to trusted computing that offers better security and authentication with none of the drawbacks that exist in the current state of the art. Trusted computing (TC) is a hot topic in computer science. Major software and hardware providers are planning to include TC components in the next generation of computers, and the US […]

Removing the RSA Security 1024 V3 Root

There’s been confusion today about the work we’re doing on our root store, the set of trusted certificate authorities shipped with Mozilla products. The short story is this: we’re removing the “RSA Security 1024 V3″ root from that list. Its owners have confirmed that it is not in use, and not covered by current audits. We regularly check for roots […]

How Android Security Stacks Up

How Android Security Stacks Up

Today’s smart phones have all the speed, storage, and network connectivity of desktop computers from a few years ago. Because of this, they’re a treasure trove of personal information–and likely the next battleground for computer security. What makes smart phones attractive–the ability to customize them by downloading applications–is what makes them dangerous. Apps make the mobile phone a real computer, […]

A Comfortable and Secure Login Method

As most Internet users know, it is often hard to remember or keep apart all the passwords and login names for one’s different online accounts. Dr. Bernd Borchert, together with students at the Computer Science Department of Tübingen University, has tackled this issue. They developed a new method that saves the users not only the trouble of memorizing the passwords […]

A Portable Security Risk

More and more employees are bringing personal mobile devices, such as media players, flash drives and smart phones, to work for entertainment, communications and other purposes. Equally, many employers issue their staff with such devices to allow them to be more mobile and to run business applications as part of their job. This explosion of personal devices with built in […]

Soft Spots in Hardened Software

Over the past decade, Microsoft, the target of choice for many online attackers, has hardened its operating system, adopting technologies designed to make it harder for attackers to find and exploit vulnerabilities. Apple and many other software makers have followed suit, introducing similar additional security measures to their operating systems. Yet last week, during the “Pwn2Own contest” at CanSecWest, a […]

Governments May Fake SSL Certificates

Governments May Fake SSL Certificates

Today two computer security researchers, Christopher Soghoian and Sid Stamm, released a draft of a forthcoming research paper in which they present evidence that certificate authorities (CAs) may be cooperating with government agencies to help them spy undetected on “secure” encrypted communications. (EFF sometimes advises Soghoian on responsible disclosure issues, including for this paper.) More details and reporting are available […]

Scientist Invents a Digital Security Tool Good Enough for the CIA — And for You

A British computer hacker equipped with a “Dummies” guide recently tapped into the Pentagon. As hackers get smarter, computers get more powerful and national security is put at risk. The same goes for your own personal and financial information transmitted by phone, on the Internet or through bank machines. Now a new invention developed by Dr. Jacob Scheuer of Tel […]