Jump to content

Search the Community

Showing results for tags 'security'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • The Highlands
    • Announcements
    • Bruno's All Things Linux
    • All Things Windows
    • All Things Mac
    • Hardware
    • Mobility
    • Security & Networking
    • Social Media
    • The Restaurant at the Edge of the Universe
    • Forum Feedback

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

  1. Just found this interesting and vast guide to reducing outgoing tracking data from Firefox. It's in the form of a user.js file which you could deploy altogether, or select particular items and edit them with about:config. Firefox does appear to send various data out and most of us probably don't need the functionality this data supports. Who ever used "Pocket" for instance? https://gist.github.com/MrYar/751e0e5f3f1430db7ec5a8c8aa237b72
  2. One thing about computer technology; no matter how long you've been around, something new will always come along to make you feel like you don't understand a thing. I'm all in favor of 2-factor authentication. I've long appreciated the weakness of passwords. But a recent incident involving a very popular password manager service, which I've used for over a decade and won't name because nothing that happened was their fault, I realized that there are serious shortcomings with depending on relying on 2-factor authentication that uses codes sent to you via text message or codes generated with
  3. Debian has just released a special point release specifically to address a vulnerability in apt. More details: https://forums.scotsnewsletter.com/index.php?showtopic=22937&st=1500#entry458542 https://forums.scotsnewsletter.com/index.php?showtopic=22937&st=1500#entry458531
  4. Jeber

    Yubi keys and 2FA

    One of the best aspects of this forum is the ability to ask a question and get honest, simple, down-to-earth answers that are informative and easy to understand. For years I've seen references to physical security keys like Yubi keys. I've always been big on security. I use 2-factor authentication anywhere it's offered, even if many sites employ it in a way that makes it inconvenient and cludgy. Based on what I've read it seems that Yubi-type keys provide the same basic security that 2-factor does. The key is registered to you (somehow) and the fact you have it in your possession and
  5. This thread is dedicated to useful tips on running an Arch install. CCACHE To Help Speed Up Compilation Process When Installing Packages From AUR You need to install ccache package first. For those wondering, ccache is a fast c/c++ compiler which is used to speed up the compilation process. It speeds up recompilation by caching previous compilations and detecting when the same compilation is being done again. It supports C, C++, Objective-C and Objective-C++.
  6. So has anyone tried this yet ????? http://www.zdnet.com/article/encrypted-email-service-protonmail-comes-out-of-beta-unveils-ios-and-android-apps/ https://protonmail.com/security-details ProtonMail Plans Explained (Free, Paid, Visionary) https://protonmail.com/support/knowledge-base/email-ddos-protection/ Seems to be still under very active development but reading through a lot if the comments it looks to be at a pretty stable and usable state. Makes sense as they have opened it up for anyone to join as opposed to the inv
  7. I have a friend (no, really) who has found out that a third party has access to his work emails. This man's a lawyer, so this is a fairly serious issue. The emails were sent from his work server to another attorney. His server is on a privately owned domain and maintained by a friend of his. We don't know what setup the other attorney has for her email. I told him, and I hope I was correct in my advice, that the maintainer of the server should be able to look at the logs for that domain and see which IP addresses logged in during the month in question. Eliminating the IPs that are know
  8. abarbarian

    Firejail .....

    This looks very interesting and has a Arch package in the AUR.I am typing this from a firejail firefox. https://l3net.wordpr...jects/firejail/ https://l3net.wordpr...ozilla-firefox/ https://l3net.wordpr...bilities-guide/ There are quite a few pages of stuff to read and some of the comments are worth a read aswell.Of interest is the fact that you can run VLC-without internet access (or similar program) and also isolate programs like the TorBrowser and Dropbox. I ran a quick comparison opening up FF with a page with video running and it does not seem to use
  9. http://www.blackmoreops.com/2014/08/05/world-live-ddos-attack-maps-live-ddos-monitoring/ Amazing live updated maps, clicking on the maps shows different information. The map would make a great screensaver if it did not consume so much bandwidth (bandwidth heavy maps) Looking at the avatar on the site raises the Q - has Josh got a secret part time job in the security world.
  10. http://linuxgizmos.com/networking-security-appliance-runs-snort-on-openwrt/ here is the Kickstarter page which is not running yet. https://www.kickstarter.com/projects/itus/900815374?token=f30bd9c9 Is the iGuardian a useful tool or just a load of fluff ?
  11. Dropbox told about vulnerability in November 2013, only fixed it when the media showed interest - Graham Cluley And likely Dropbox still wonders why security aware people may not trust them with their sensitive information... I stopped using them for anything that matters long ago.
  12. ross549

    iOS Security- Done right?

    Much has been said recently with the release of the 2014 white paper iOS Security by Apple. It is not a super difficult read, but I am not a cryptography guy, so some of it is well above my head. From what I've been able to glean, however, is that Apple is 100% behind security and privacy in iOS. It is not a long read, and I encourage everyone to take a look. iMessage security as well as Touch ID is covered as well. Steve Gibson did a bit of a deep dive into the white paper, and he had some interesting things to say about Apple's claims. You can see his report on Security Now b
  13. http://www.linuxbsdos.com/2014/02/27/boeing-black-android-smartphone-will-self-destruct-if-tampered-with/ For government officials only.
  14. Perhaps you folks know more than me on this subject, i've found this particular email on my spam that emulates the website of one of the banks on my country, i knew right away that it was a phishing link (years ago my friend did this with facebook and i learnt about it) the thing is i went to the site and wrote fake username and fake password like "myuseris" password "notyours" just for the fun of it, anyway that got me thinking, can i actually be exploited via an email with HTML code on it? and if that is so, how much of my system is compromised? Any way to know if chromium is actual
  15. Adware vendors buy Chrome Extensions to send ad- and malware-filled updates Once in control, they can silently push new ad-filled "updates" to those users. http://arstechnica.com/security/2014/01/malware-vendors-buy-chrome-extensions-to-send-adware-filled-updates/ Something to watch for if you are a Chrome user.
  16. If you are a LinkedIn user with an iPhone or iPad, you should do some research before using/opting in to Intro app for email. I searched "linkedin intro security" and found a bunch of write-ups of the security risks and questionable practices built in to Intro.
  17. Dan's Data is one of my old favourite sites, Aussie, kinda geeky, with hints of XKCD and rather addictive. And lots of really useful tips. Although his posts are less frequent lately, there's a goldmine to explore. I just happened across this article, a fascinating insight on passwords. Put your protective sarcasm goggles on. On the h4xx0ring of p4sswordZ
  18. WinPatrol PLUS For Everyone Just $2 - Bits from Bill Blog Much more in the posting! Thanks Bill for doing this again!!! Gonna go snag some more for me! Great way to 'donate' and say how much I love WinPatrol! ' FYI: If you buy via credit card, there is a $.50 surcharge. The PayPal way to pay without a surcharge is in the RIGHT navigation on WinPatrol.com Also note that you can buy multiple copies of individual WinPatrol at $2 each or a Family Pack for $10 Last time I purchase 5 individual licenses so I could pass some on to friends. This time I think I will just do I cho
  19. http://www.extremetech.com/extreme/155392-international-space-station-switches-from-windows-to-linux-for-improved-reliability From the comments section,
  20. Studying can be a real drag if you never take a break. So I found this little gem which should provide some relief from the drudgery. http://www.unixmen.com/audit-the-security-of-your-unixlinux-systems-using-lynis/ http://www.rootkit.nl/files/lynis-documentation.html https://aur.archlinux.org/packages/lynis/ Well I gave the program a run through on my home pc. Worked just fine and gave these warnings, and theses suggestions, There is tons of stuff in the suggestions list an I am not sure about how to do everything it suggests or even if I nee
  21. V.T. Eric Layton

    Fun w/ SSH

    I spent the evening tonight setting my systems back up for ssh connectivity. During the process, I made some changes to how I had been doing it previously. Read more about it here --> http://noctslackv1.wordpress.com/2013/03/17/ssh-can-it-be-more-secure/ Have a wonderful day!
  22. V.T. Eric Layton

    Evernote Hacked!

    Evernote hacked; millions must change passwords
  23. V.T. Eric Layton

    Linux Rootkit News

    Corrine posted this interesting news over in the Security area. Check it out --> http://forums.scotsnewsletter.com/index.php?showtopic=59289
×
×
  • Create New...