Security is the degree of protection against danger, damage, loss, and crime. Security as a form of protection are structures and processes that provide or improve security as a condition. [http://en.wikipedia.org/wiki/Security]
It can't be that my anti virus want to scan my disk every day (default settings) and take 23 hours to do so.
At the end, these anti virus are just sucking my CPU brute power (peak 20%) and worst of all a good part of IO
power, and trust me windows IO are just hilarious compared to Linux, try eclipse under Linux it just fly!
Pictured is AVG but this post is not targeted against it. They are ALL ridiculously slow.
Windows just can't protect itself from Internet and mitigate attacks that it need a range of 3rd
party software...sucking power and my time. We are far away from the Internet OS
The Joomla Project is pleased to announce the immediate availability of Joomla 1.5.12 [Wojmamni Ama Woi]. This release contains a number of bug fixes and three moderate-level security fixes. It has been less than a month since Joomla 1.5.11 was released on June 3, 2009.
This release marks an important milestone for the Joomla Project due to the upgrade of the PEAR library to the new BSD licensed version, which brings the codebase into full compliance with the GPL. In addition, this release contains an important upgrade to TinyMCE v 220.127.116.11.
Statistics for the 1.5.12 release period:
|A SECURITY flaw could allow hackers to eavesdrop on cellphone conversations made on Bluetooth-based wireless headsets was revealed in april 2004...But at that time an expensive piece of hardware was needed. Now it is even worse a simple brute force while the device are doing keyring exchange...|
"Whitehouse showed in 2004 that a hacker could arrive at this link key without knowing the PIN using a piece of equipment called a Bluetooth sniffer. This can record the exchanged messages being used to derive the link key and feed the recordings to software that knows the Bluetooth algorithms and can cycle through all 10,000 possibilities of the PIN. Once a hacker knows the link keys, Whitehouse reasoned they could hijack the device."
Now the new attack force the two bluetooth devices to pair, they can work out the link key in just 0.06 seconds on a Pentium IV-enabled computer, and 0.3 seconds on a Pentium-III
|Introducing the TASER XREP the eXtended Range Electronic Projectile. XREP is a self-contained, wireless projectile that fires from a standard 12-gauge shotgun. It delivers the same Neuro-Muscular Incapacitation (NMI) bio-effect as our handheld TASER X26, but can be delivered to a distance of up to 100 feet, combining blunt impact with field proven TASER NMI.|
This list is an ongoing work and since the version 1.0 (01 March 2008), a lot of nodes/ideas have been added.
Secure, Safe, Fast Linux Hosting sound silly as nothing can be fast and secure at the same time, but I've compiled a list of things that are worth doing if you are maintaining your own server. This list is clearly targeted for people running an open source stack made of Apache, MySQL, PHP and Linux.
By clicking read more, You'll be able to go through the checklist, or maybe you'll prefer the mindmap version HERE
The next mind map will be a how to forensic a hacked Linux server...
The Joomla Project has announced the availability of Joomla 1.5.8.
This release contains a number of bug fixes and two moderate-level security fixes and you would be well advised
to upgrade to this version if you are running any other Joomla 1.5.x version. (Users of Joomla 1.0.x are urged to
ensure they are running Joomla 1.0.15, but do not need to migrate to Joomla 1.5.8 immediately.
Joomla patches for SecurityImages 5 will follow in a few hours... (before 22:00 GMT+1)
The Joomla Project announces the immediate availability of Joomla 1.5.15 [Wojmamni ama mamni]. It has been three months since Joomla 1.5.14 was released on July 30, 2009.
The Development Working Group's goal is to continue to provide regular, frequent updates to the Joomla community.
I use to make mind map to organize my ideas, or to organize huge amount of data in a tree manner. Maintaining your own root server is time consuming, to say the least, but it will also force you to put your energy in areas where there is a lot of new things to learn. Here I present you a mind map that contains most of the tools and ideas of what you should monitor on a Linux server.
This mind map is an ongoing work, that is why it has also a version number in it (v1.0.0). As soon as I will learn new tricks, the mind map will be updated. Your feedback is always welcomed!
By clicking read more, You'll be able to go through the checklist as text, or download the mind map as a PDF (600kB)
Privacy Statement | Copyright Notice | Licenses
© 1999-2012 Waltercedric.com. Designed by Cédric Walter. Sitemap
Reproduction without explicit permission is prohibited. All Rights Reserved. All photos remain copyright © their rightful owners. No copyright infringement is intended.
Disclaimer: The editor(s) reserve the right to edit any comments that are found to be abusive, offensive, contain profanity, serves as spam, is largely self-promotional, or displaying attempts to harbour irrelevant text links for any purpose.