security too secure
Summary: security too secure
The security thing won't let me in this sight no matter how I accept,
confirm, get certificate, etc.
Browser Details: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.4; en-GB; rv:1.9.1b4) Gecko/20090423 Firefox/3.5b4
From URL: http://hendrix.mozilla.org/
Note to readers: Hendrix gives no expectation of a response to this feedback
but if you wish to provide one you must BCC (not CC) the sender for them to
...How secure is secure?
Thanks to this group and all the high tech individuals who frequent it I
have learned how to protect my PC from the inside out. But what about
security risks to my info 'before' it gets to my computer? Like my mail
box on the server. Could someone hack into that and thumb through my
If so, how would I ever know?
(The short story)
We have a rogue employee at my work who one day decided to run the web
site, she got in tight with the ISP, got tools to set and delete
passwords on a protected directory on the server. Who knows if she has
telnet access to other things, li...when is secure, secure?
I wrote a custom authentication handler for PureFTPD, using a combination of
authentication methods, for about 4 different types of users.
So far, from testing it, it does look to work properly, and does it's job
pretty well (and fast). I use #!/usr/bin/perl -W as well as use Strict, and
use warnings, and the code returns no errors or warnings when run.
I am right to presume that this basically only really tells me the my syntax
and structure of the application is right? What's a good way to see whether
it is actually SECURE... There is a couple of lines of...Secure By Design: How Guardian Digital Secures EnGarde Secure Linux
"EnGarde Secure Linux is not just another "repackaged" Linux
distribution, but a modern open source system built from the ground up
to provide secure services in the threatening world of the modern
...."The Community edition of EnGarde Secure Linux is completely free
and open source, and online security and application updates are
freely available with GDSN registration."...
...Schneier on Security: Linux Security
Schneier on Security: Linux Security
I'm a big fan of the Honeynet Project (and a member of their board of
directors). They don't have a security product; they do security
research. Basically, they wire computers up with sensors, put them on
the Internet, and watch hackers attack them.
They just released a report about the security of Linux:
=====================================...Torvalds strongly objects to Windows 8 secure boot keys in the Linux kernel
Torvalds strongly objects to Windows 8 secure boot keys in the Linux kernel
Summary: Linux founder Linus Torvalds makes no bones about it. He thinks
inserting signed binaries into the Linux kernel is "moronic."
Time to kiss binaries goodbye is my take and let Linux be the standard.
Ubuntu 12.04 - AMD64 - EXT4 - KDE 4.8.5 at sda9
Registered Linux User #380263
On 2/28/2013 10:22 AM, Jimmy Johnson wrote:
> Torvalds strongly objects to...Microsoft confirms that UEFI 'secure boot' might lock out Linux from new PC's
Can anyone list machines that we can still load Opensuse or Linux on in
This article shows that Microsoft is going to lock their machines to
New Windows only.
'Microsoft confirms that UEFI 'secure boot' might lock out
Linux and older versions of Windows from new PCs | ZDNet'
Any system that has UEFI instead of BIOS has this potential. IF the OEM
decides to implement it and does not provide a way to turn it off it
cou...UEFI Secure Boot
Steve, please revisit your understanding of the UEFI Secure Boot issue.
I think you've misrepresented the situation in Microsoft's favor.
Microsoft have made it clear that they will not require that OEMs allow
end users to either disable or add keys to their UEFI firmware. They
have shifted the blame and simply say that if an end user cannot use
another operating system, it's the OEM's fault.
Some OEMs may make it easy to install other operating systems and some
may make it impossible. The OEMs have little incentive to support users
installing alternative operating sy...security with DSL and boot up
If one has DSL on all the time with modem on and hooked up to computer
and one turns on their computer,is the computer vulnerable at any time
from hacking during the boot up process.
I have noticed on several different computers that the anti virus and
firewall icons appear last in the tray. Does this mean these security
programs turn on last and leave the computer open to attack until they
are fully turned on?
I always turn my computer and modem off when not in use(energy
savings).I turn my computer on first then my modem.
Joe K" <"Joe K <"Joe K"@myhome.com...Securing the boot environment?
Hi I am not sure if this is the correct place to ask this question but
if not pls point me to the proper place pls. :)
This is for Novell for a desktop computer with no server and running
just on windows 7.
Like to ask how does novell secure the booting enviroment when the
computer is turned on? Can users enter f8, advance safe mode, run the CD
drive, etc and bypass novell secruity to change the settings? I assume
the admin can set restrictions so users cannot use these functions
Does these function edit the windows reg to block this or does the
progammers have to w...Forever loading boot/linux boot/initrd
Imaging was working fine 3 days ago. Now its broken. Zen 7 sp1. I have
not changed anything on the network. It takes about 45 minutes to load
the above files. I can boot with a boot disk fine but when it starts
downloading the image, its really slow. I have reinstalled imaging and
pxe services on the server. I am using wireshark and don't see any
unusual traffic on the network. Any ideas would be appreciated.
On Fri, 29 Aug 2008 14:36:02 GMT, warmstr wrote:
> I have
> not ch...F-Secure Readies Security Software For Linux
F-Secure Corp. on Tuesday unveiled security software for open-source Samba
file servers and Linux, addressing a need that's growing within the
The Finnish company announced the availability of antivirus software for
Samba that automatically detects and removes viruses from files stored on
the server. The new product is meant to protect all Samba-attached computers
from malicious code that could enter the network from a Windows or Linux
Next month, F-Secure plans to ship a Linux version of F-Secure Policy
Manager, which will extend centrally managed ...Secure connections: how secure are they?
......... both useful and malicious information can be transmitted via network
connections. Standard solutions protect computers against threats present in
standard network connections, but aren't able to counter threats present in
secure connections. Verifying the contents of a secure connection is
impossible by virtue of its secure nature, as demonstrated by the different
types of protection listed above. As a result, malicious data within secure
channels can cause a significant amount of damage, and sometimes more than if
it were to be transmitted via a standard, non-s...How secure is secure enough?
July 28, 2008 (Computerworld) This story originally appeared in
Computerworld's print edition.
If there is a Holy Grail in the information security industry, it surely is
the answer to the question, "How secure is secure enough?"
It's a question that many security managers have either avoided answering
altogether or tried to quickly sidestep by throwing a fistful of mainly
pointless operational metrics at anyone who cared to ask.