Security

Top 3 Free Best Antivirus Apps For Android In 2013

Being one of the most popular operating systems for smarphones, Android is a target for malware and viruses. The statistics show that Android accounted...

ChatCrypt: Let us Chat Secure

Just like most of you, I also really hate to be monitored by third parties when i am communicating with Friends/Colleagues on Internet. Now...

qBittorrent Fixes The Heartbleed Bug

A new version of the qBittorent BitTorrent client has been released with a fix for the Heartbleed bug, a very serious bug discovered a...

Pandora FMS – An Universal Monitoring System For Your Organization

What is Pandora FMS? Pandora FMS is an open source Flexible Monitoring System developed by Artica, a Spanish based company founded in 2005. The project...

How Secure is Your Password? Create a Strong Password and Sleep...

Our on-line content, bank accounts, shopping accounts and social network accounts are as safe as our passwords are. Most people don't  consider password security...

Interview With Sancho Lerena From Pandora FMS

Hello Unixmen readers, today we have a special guest here at our desk! Ladies and gentlemen, we  present you our friend Sancho Lerena from Pandora...

Play A Crossword Game With Adobe’s Leaked Passwords

Play A Crossword Game With Adobe’s Leaked Passwords A crossword game with Adobe’s Leaked Passwords is now available for playing at http://zed0.co.uk/crossword/. The author of...

Introduction to SSH

Introduction What is SSH? Why use SSH? SSH is a network protocol similar to telnet or FTP, yet slightly different because it offers secure data communication....

Deadly Linux Commands

In every society there is always the good and the bad. The bad are working day in day out to harm the works of...

Sandboxed Gentoo

Introduction This article is a guide on installing Gentoo in another Linux distribution (Arch, in this case). Look at it like a BSD Jail. It's...

How To Avoid Data Surveillance Programs

Probably you've heard about the NSA surveillance program PRISM, XKeyscore and the GCHQ's Tempora. If you did not, you should start looking up for...

How To Install Linux Kernel 3.12.4 In Ubuntu

Linux Kernel 3.12.4 has been officially released with fixes for inet6_init() cleanup order, seqlock deadlock in ip6_finish_output2 and Report Descriptor for Logitech MOMO Force. In this...

Larry Page, “Dear Google Users”

Internet media has reported that the NSA, the secretive United States Government Organization, has direct access to servers of some of the biggest web...

A Secure Password

The minimum you can do to protect yourself is to avoid weak passwords. In most cases people do not know what weak passwords are...

Twelve Vulnerabilities Have Been Fixed In Ubuntu 12.04, Time To Update

Canonical has released security updates for Ubuntu 12.04 LTS and advices to update your system as soon as possible. There are 12 vulnerabilities discovered...

Illegal Access to Adobe Source Code

Adobe Systems, Inc. (/əˈdoʊbiː/ ə-doh-bee), is an American multinational computer software company headquartered in San Jose, California, United States. The company has historically focused...

Linux Trojan Stealing Bank Data From Linux Users

We love linux and one of the reason why we love it is the high security it offers. Shopping in a linux box is...

OIN-A patent pool to protect Linux users from lawsuits

OIN or the Open Invention Network is an industry-supporting independent group consisting of Linux users in a royalty-free environment and be protected from lawsuits...