Find the answer to your Linux question:
Page 6 of 88 FirstFirst ... 2 3 4 5 6 7 8 9 10 16 56 ... LastLast
Threads 101 to 120 of 1741

Forum: Security

Post here for help with Linux security issues: antivirus, firewalls, encryption, vulnerabilities, etc

  1. Sticky Thread Sticky: A short guide to Linux security

    Here at linuxforums.org we are often asked about the potential threat of a virus or malware attack. This short guide is designed to answer some of...

    Started by fingal, 02-25-2006
    • Replies: 1
    • Views: 73,505
    01-11-2010 Go to last post
  2.  
  1. Hardware device preventing DDoS?

    I recently came across a company with a hardware box they claim prevents DDoS's. Now my question is, no. 1 will it? HOW? And if so, why can't...

    Started by resetreset, 12-04-2014
    2 Pages
    1 2
    • Replies: 17
    • Views: 3,201
    12-22-2014 Go to last post
  2. AES 256 encryption with 7z

    Hi, when I create archive in Ubuntu, I choose with right mouse button in context menu "Compress", leave default ".7z", provide password and leave...

    Started by johnyjj2, 12-21-2014
    • Replies: 0
    • Views: 4,263
    12-21-2014 Go to last post
  3. lost+found directory hiding malware. How to delete?

    Because of being hacked, I had switched to live linux DVDs. My personal files are stored on FAT32Crackers have infected all of my personal files on...

    Started by BadBIOSVictim, 07-07-2014
    2 Pages
    1 2
    • Replies: 16
    • Views: 5,471
    12-20-2014 Go to last post
  4. How to set up non-expiring tickets for Kerberos

    Hello Forum, I need to set up non-expiring Kerberos security tickets. Can you please recommend how to do that.

    Started by ggolub, 12-14-2014
    • Replies: 0
    • Views: 866
    12-14-2014 Go to last post
  5. IP Address Trace Through A VPN

    Is it possible to trace a IP address through a VPN? I.e. I use a VPN to connect from my home pc to my work PC. If I was traced would my home IP be...

    Started by Tim_Wright, 03-07-2007
    • Replies: 3
    • Views: 12,196
    12-08-2014 Go to last post
  6. purpose of line : root ALL = (ALL) ALL in sudoers

    what is the purpose in suduoers configuration file of the following entry ? root ALL = (ALL) ALL I thought root had all these rights regardless...

    Started by axelmunt, 12-05-2014
    • Replies: 2
    • Views: 1,136
    12-06-2014 Go to last post
  7. Scanning a Windows PC for viruses/malware.

    I need to scan a Windows PC(probably Windows 7) for viruses and malware and had planned to use ClamTK to do the job. I wanted to install a light...

    Started by TNFrank, 11-07-2014
    • Replies: 5
    • Views: 1,372
    12-02-2014 Go to last post
  8. Linux Firewall / Comcast / Optimizing Bandwidth

    I have been running OpenSUSE for years as a file server, web server, DNS server, DHCP server, Squid server... And as a NAT firewall. Generally, I've...

    Started by ember1205, 10-12-2014
    • Replies: 6
    • Views: 1,474
    12-01-2014 Go to last post
  9. żUnknown users?

    Hello! Well my story is somehow confusing, because my cousin borrowed my laptop from me (the one I'm writing from now) and I have noticed some...

    Started by Dhalf, 11-19-2014
    • Replies: 1
    • Views: 794
    11-19-2014 Go to last post
  10. Can anyone explain .ssh/ contents?

    -rw------- 1 root root 2.1K Nov 7 18:15 authorized_keys -rw------- 1 root root 1.7K Nov 7 06:01 id_rsa -rw-r--r-- 1 root root 405 Nov 7...

    Started by postcd, 11-12-2014
    • Replies: 1
    • Views: 715
    11-13-2014 Go to last post
  11. Tails 1.0 released

    For those Tails users the 1.0 version has been released. It can be obtained here..... https://tails.boum.org/download/index.en.html

    Started by docbop, 05-03-2014
    • Replies: 7
    • Views: 1,582
    11-10-2014 Go to last post
  12. Asprox Botnet attack

    Hi, My server had a Asprox botnet attack the last days and I'm trying to figure out how this has happened. In the root directory of the...

    Started by symeon_mattes, 10-31-2014
    • Replies: 0
    • Views: 886
    10-31-2014 Go to last post
  13. rsyslog and loganalyzer

    Installed this last week and just from one syslog source (firewall) the mysql database is 26 gigs in size. I am not sure where to change the...

    Started by DigiCrime, 10-13-2014
    • Replies: 2
    • Views: 1,017
    10-27-2014 Go to last post
  14. Linux GUI full disk encryption including /boot

    Hello, im using Windows OS and i wish to switch to Linux with GUI, i dont have any distribution in mind (i know Ubuntu has huge community, so...

    Started by postcd, 10-24-2014
    • Replies: 3
    • Views: 1,073
    10-25-2014 Go to last post
  15. SSLv3 vulnerability chatter

    Nasty SSL 3.0 vuln to be revealed soon ? sources ? The Register SSLv3 is old and crufty but still enabled by default and according to the linked...

    Started by cnamejj, 10-14-2014
    • Replies: 2
    • Views: 1,098
    10-15-2014 Go to last post
  16. [SOLVED] How to upgrade 'bash' to avoid bash bug?

    Hi all, I was reading that Debian suggests an update and install of the latests bash software. I've had a little bit of difficulty as I'm sort of...

    Started by jkwilborn, 09-28-2014
    • Replies: 3
    • Views: 1,007
    09-28-2014 Go to last post
  17. Cant delete or chown file as a root

    Hello, some hack script suddenly appear in the /root directory of my VPS. Lets call it "badscript" but i cant delete it or chown it being...

    Started by postcd, 07-30-2014
    • Replies: 5
    • Views: 1,349
    09-28-2014 Go to last post
  18. One to be aware of

    Bash is vulnerable to remote code execution under certain circumstances: See here and here. Expect patches soon. I think this probably classifies as...

    Started by elija, 09-25-2014
    • Replies: 7
    • Views: 1,533
    09-27-2014 Go to last post
  19. How to avoid chrome store password in seahorse?

    Hello, I am very concerned about the unencrypted passwords saved by chrome in seahorse. This equipment is shared and used by several people,...

    Started by nelo, 09-16-2014
    • Replies: 6
    • Views: 1,495
    09-18-2014 Go to last post
  20. Deny user access to system configuration :?:

    Hello and thanks for your answers. I need to know how can I deny user access to the system configuration environment in kde. Too I need to know...

    Started by GendeDios, 09-12-2014
    • Replies: 4
    • Views: 968
    09-12-2014 Go to last post

Thread Display Options

Use this control to limit the display of threads to those newer than the specified time frame.

Allows you to choose the data by which the thread list will be sorted.

Order threads in...

Note: when sorting by date, 'descending order' will show the newest results first.

Icon Legend

Contains unread posts
Contains unread posts
Contains no unread posts
Contains no unread posts
More than 15 replies or 150 views
Hot thread with unread posts
More than 15 replies or 150 views
Hot thread with no unread posts
Closed Thread
Thread is closed
Thread Contains a Message Written By You
You have posted in this thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •