According to MS, this will protect your computer against the Chinese Google attack: Microsoft tells us that you can try to block the IE attack vector by setting “Internet and Local intranet security zone settings to “High” to prompt before running ActiveX Controls and Active Scripting in these zones or configure Internet Explorer to prompt […]
TrueCrypt is a software application used for real-time on-the-fly encryption. It is distributed without cost, and has source code available, although under a restrictive license. It can create a virtual encrypted disk within a file or a device-hosted encrypted volume on either an individual partition or an entire storage device. It supports Microsoft Windows, Mac […]
Microsoft has acknowledged that they slipped the .NET Framework Assistant plugin into Firefox via Windows Update this past February, and that it has poked a “critical” hole in the browser’s security (effectively bringing Firefox down to IE’s level). Microsoft has deemed the hole to be a “critical” security threat, as it gives webmasters the ability […]
A password manager is software that helps a user organize passwords and PIN codes. The software typically has a local database or files that holds the encrypted password data. Many password managers also work as a form filler, thus they fill the user and password data automatically into forms. These are usually implemented as a […]
Rootkit scanner is scanning tool to ensure you for about 99.9%* you’re clean of nasty tools. This tool scans for rootkits, backdoors and local exploits by running tests like: – MD5 hash compare – Look for default files used by rootkits – Wrong file permissions for binaries – Look for suspected strings in LKM and […]
For pidgin users , there is a security issue regarding storing passwords in pidgin, so this program stores the passwords in archives .xml in clear text without any encryption. So any one can easily boot into recovery mode while you are away and find all your passwords in plain text. Then he can just copy […]
18/09 : Announced by UPR team the release of the second stable release of Ubuntu Privacy Remix 9.04. All software packages including the kernel were updated to their newest version to close security holes and fix bugs. Included are small bugfixes and improvements in the scripts for handling extended TrueCrypt-Volumes, including a new progress bar […]
One of the biggest security holes you could open on your server is to allow directly logging in as root through ssh. This howto shows you how to add a new user to your server so that you can su or sudo to root from it .