Security http://www.linuxjournal.com/taxonomy/term/31/all en Never Trust Yellow Fruit http://www.linuxjournal.com/content/never-trust-yellow-fruit <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/never-trust-yellow-fruit" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12119pineapplef2.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="156" /></a> </div> </div> </div> <!--paging_filter--><p> You've probably heard about the WiFi Pineapple from Hak5. It's a fascinating device that allows you to do some creepy pen testing. It's the sort of tool that could be used for evil, but it's also incredibly useful for securing networks. <span class="read-more"><a href="/content/never-trust-yellow-fruit"> more>></a></span></p> Networking Security Tue, 20 Jun 2017 14:34:45 +0000 Shawn Powers 1339418 at http://www.linuxjournal.com BlueCat DNS Edge http://www.linuxjournal.com/content/bluecat-dns-edge <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/bluecat-dns-edge" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12187f2.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="51" /></a> </div> </div> </div> <!--paging_filter--><p> Migration to the cloud, the flexibility of network virtualization and the promise of IoT involve IT transformations that have placed incredible strain on enterprise security.<span class="read-more"><a href="/content/bluecat-dns-edge"> more>></a></span></p> Cloud Enterprise IOT Networking Products Security Mon, 19 Jun 2017 11:27:04 +0000 James Gray 1339417 at http://www.linuxjournal.com Jetico's BestCrypt Container Encryption for Linux http://www.linuxjournal.com/content/jeticos-bestcrypt-container-encryption-linux-0 <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/jeticos-bestcrypt-container-encryption-linux-0" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12187f1.png" alt="" title="" class="imagecache imagecache-node-page" width="200" height="144" /></a> </div> </div> </div> <!--paging_filter--><p> Cyber-attacks are now constant, threats to privacy are increasing, and more rigid regulations are looming worldwide. To help IT folks relax in the face of these challenges, <a href="http://jetico.com">Jetico</a> updated its BestCrypt Container Encryption solution to include Container Guard. <span class="read-more"><a href="/content/jeticos-bestcrypt-container-encryption-linux-0"> more>></a></span></p> Encryption Privacy Products Security Fri, 16 Jun 2017 16:22:09 +0000 James Gray 1339416 at http://www.linuxjournal.com Improving Linux Security with DevSecOps http://www.linuxjournal.com/content/improving-linux-security-devsecops <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/improving-linux-security-devsecops" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/security-1202344_640_6.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="113" /></a> </div> </div> </div> <!--paging_filter--><p> Ask people who run IT departments these days what keeps them up at night, and they'll probably tell you it's security&mdash;or the lack of it. With the explosive growth of malicious attacks on everything from hospitals to Fortune 500s, security&mdash;not hardware, software and even staff&mdash;is what currently makes life miserable. <span class="read-more"><a href="/content/improving-linux-security-devsecops"> more>></a></span></p> DevOps Enterprise Security Wed, 31 May 2017 14:15:11 +0000 John S. Tonello 1339407 at http://www.linuxjournal.com Wibu-Systems CmASIC http://www.linuxjournal.com/content/wibu-systems-cmasic <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/wibu-systems-cmasic" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12173f4.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="124" /></a> </div> </div> </div> <!--paging_filter--><p> Wibu-Systems describes the new generation of its CmASIC module as "the answer to the security-by-design needs of modern embedded computing technology leaders:. CmASIC is a module that Intelligent Device Manufacturers (IDMs) can directly embed into their boards to provide out-of-the box security and entitlement management. <span class="read-more"><a href="/content/wibu-systems-cmasic"> more>></a></span></p> http://www.linuxjournal.com/content/wibu-systems-cmasic#comments Embedded Products Security Fri, 19 May 2017 15:30:38 +0000 James Gray 1339394 at http://www.linuxjournal.com CyKick Labs Ltd.'s Telepath http://www.linuxjournal.com/content/cykick-labs-ltds-telepath <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/cykick-labs-ltds-telepath" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12168f8.png" alt="" title="" class="imagecache imagecache-node-page" width="200" height="50" /></a> </div> </div> </div> <!--paging_filter--><p> When a shopper enters a store, the retailer doesn't know if the person will simply browse, make purchases, shoplift or hold up the register. The same goes for visitors to a website. The challenge is to prevent and stop the bad guys without hindering beneficial customer transactions. <span class="read-more"><a href="/content/cykick-labs-ltds-telepath"> more>></a></span></p> http://www.linuxjournal.com/content/cykick-labs-ltds-telepath#comments Big Data Products Security Wed, 03 May 2017 13:27:29 +0000 James Gray 1339374 at http://www.linuxjournal.com PasswordPing Ltd.'s Exposed Password and Credentials API Service http://www.linuxjournal.com/content/passwordping-ltds-exposed-password-and-credentials-api-service <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/passwordping-ltds-exposed-password-and-credentials-api-service" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/logo_vertical_0.png" alt="" title="" class="imagecache imagecache-node-page" width="200" height="200" /></a> </div> </div> </div> <!--paging_filter--><p> The typical online user has an average of 90 active and inactive online accounts. This exposure to threats, notes software and IT security specialist PasswordPing Ltd., helps to inform us why billions of credentials have been exposed in the past five years alone. To assist organizations and companies to screen their user accounts for known, compromised credentials, PasswordPing Ltd.<span class="read-more"><a href="/content/passwordping-ltds-exposed-password-and-credentials-api-service"> more>></a></span></p> http://www.linuxjournal.com/content/passwordping-ltds-exposed-password-and-credentials-api-service#comments Products Security Fri, 28 Apr 2017 16:15:21 +0000 James Gray 1339372 at http://www.linuxjournal.com Tor Security for Android and Desktop Linux http://www.linuxjournal.com/content/tor-security-android-and-desktop-linux <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/tor-security-android-and-desktop-linux" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/orbot-07.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="355" /></a> </div> </div> </div> <!--paging_filter--><h3> Introduction</h3> <p> Internet service providers in the United States have just been <a href="https://www.nytimes.com/2017/03/29/opinion/how-the-republicans-sold-your-privacy-to-internet-providers.html?_r=1">given the green light</a> to sell usage history of their subscribers by <a href="https://www.congress.gov/bill/115th-congress/senate-joint-resolution/34/all-info">S J Res 34</a>,<span class="read-more"><a href="/content/tor-security-android-and-desktop-linux"> more>></a></span></p> http://www.linuxjournal.com/content/tor-security-android-and-desktop-linux#comments Android Desktop Security Tails Tor Wed, 12 Apr 2017 15:32:53 +0000 Charles Fisher 1339360 at http://www.linuxjournal.com Simple Server Hardening, Part II http://www.linuxjournal.com/content/simple-server-hardening-part-ii <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/simple-server-hardening-part-ii" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/security-1202344_640_7.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="113" /></a> </div> </div> </div> <!--paging_filter--><p> In my <a href="http://www.linuxjournal.com/content/simple-server-hardening">last article</a>, I talked about the classic, complicated approach to server hardening you typically will find in many hardening documents and countered it with some specific, simple hardening steps that are much more effective and take a only few minutes.<span class="read-more"><a href="/content/simple-server-hardening-part-ii"> more>></a></span></p> http://www.linuxjournal.com/content/simple-server-hardening-part-ii#comments HOW-TOs Security Servers SysAdmin Tue, 11 Apr 2017 12:17:17 +0000 Kyle Rankin 1339355 at http://www.linuxjournal.com Flat File Encryption with OpenSSL and GPG http://www.linuxjournal.com/content/flat-file-encryption-openssl-and-gpg <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/flat-file-encryption-openssl-and-gpg" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/computer-1294045_640.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="200" /></a> </div> </div> </div> <!--paging_filter--><p> The Pretty Good Privacy (PGP) application, which has long been known as a primary tool for file encryption, commonly focused on email. It has management tools for exchanging credentials with peers and creating secure communication channels over untrusted networks.<span class="read-more"><a href="/content/flat-file-encryption-openssl-and-gpg"> more>></a></span></p> http://www.linuxjournal.com/content/flat-file-encryption-openssl-and-gpg#comments Encryption GPG HOW-TOs OpenSSL Security Tue, 04 Apr 2017 09:46:42 +0000 Charles Fisher 1339346 at http://www.linuxjournal.com smbclient Security for Windows Printing and File Transfer http://www.linuxjournal.com/content/smbclient-security-windows-printing-and-file-transfer <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/smbclient-security-windows-printing-and-file-transfer" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/security-1202344_640_5.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="113" /></a> </div> </div> </div> <!--paging_filter--><p> Microsoft Windows is usually a presence in most computing environments, and UNIX administrators likely will be forced to use resources in Windows networks from time to time. Although many are familiar with the Samba server software, the matching smbclient utility often escapes notice. <span class="read-more"><a href="/content/smbclient-security-windows-printing-and-file-transfer"> more>></a></span></p> http://www.linuxjournal.com/content/smbclient-security-windows-printing-and-file-transfer#comments Encryption Microsoft Networking Samba Security Servers SysAdmin Tue, 28 Mar 2017 12:53:56 +0000 Charles Fisher 1339335 at http://www.linuxjournal.com Hodge Podge http://www.linuxjournal.com/content/hodge-podge <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/hodge-podge" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12082f3.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="200" /></a> </div> </div> </div> <!--paging_filter--><p> For every article, I try to write something that is interesting, entertaining, educational and fun. Sometimes I even succeed. Many other times I have some things I'd like to talk about, but there's not enough of it to fill the space. This time, I decided a disjointed hodge podge would be the theme. So let's just have a virtual nerdy talk about stuff, shall we? <span class="read-more"><a href="/content/hodge-podge"> more>></a></span></p> http://www.linuxjournal.com/content/hodge-podge#comments Bitcoin Mobile Networking Security Servers Storage Tue, 21 Mar 2017 14:33:01 +0000 Shawn Powers 1339323 at http://www.linuxjournal.com William Rothwell and Nick Garner's Certified Ethical Hacker Complete Video Course (Pearson IT Certification) http://www.linuxjournal.com/content/william-rothwell-and-nick-garners-certified-ethical-hacker-complete-video-course-pearson-it- <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/william-rothwell-and-nick-garners-certified-ethical-hacker-complete-video-course-pearson-it-" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12150f5.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="240" /></a> </div> </div> </div> <!--paging_filter--><p> Watch William Rothwell and Nick Garner's new <em>Certified Ethical Hacker</em> (CEH) Complete Video Course and learn everything you need to know to ace the CEH exam in less than 11 hours. <span class="read-more"><a href="/content/william-rothwell-and-nick-garners-certified-ethical-hacker-complete-video-course-pearson-it-"> more>></a></span></p> http://www.linuxjournal.com/content/william-rothwell-and-nick-garners-certified-ethical-hacker-complete-video-course-pearson-it-#comments HOWTOs Products Security Mon, 20 Mar 2017 13:49:33 +0000 James Gray 1339319 at http://www.linuxjournal.com Preseeding Full Disk Encryption http://www.linuxjournal.com/content/preseeding-full-disk-encryption <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/preseeding-full-disk-encryption" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/security-1202344_640_4.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="113" /></a> </div> </div> </div> <!--paging_filter--><p> Usually I try to write articles that are not aimed at a particular distribution. Although I may give examples assuming a Debian-based distribution, whenever possible, I try to make my instructions applicable to everyone. This is not going to be one of those articles.<span class="read-more"><a href="/content/preseeding-full-disk-encryption"> more>></a></span></p> http://www.linuxjournal.com/content/preseeding-full-disk-encryption#comments Encryption HOW-TOs Security Thu, 16 Mar 2017 17:48:18 +0000 Kyle Rankin 1339317 at http://www.linuxjournal.com Minifree Ltd.'s GNU+Linux Computers http://www.linuxjournal.com/content/minifree-ltds-gnulinux-computers <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/minifree-ltds-gnulinux-computers" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12150f3.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="110" /></a> </div> </div> </div> <!--paging_filter--><p> <a href="http://minifree.org">Minifree Ltd.</a>&mdash;doing business as "Ministry of Freedom"&mdash;exists mainly for reasons Linuxers will like: to make it easier for people to get computers that respect their freedom and privacy, and to provide funding for a meaningful project, called Libreboot. <span class="read-more"><a href="/content/minifree-ltds-gnulinux-computers"> more>></a></span></p> http://www.linuxjournal.com/content/minifree-ltds-gnulinux-computers#comments Hardware Products Security Mon, 13 Mar 2017 12:19:16 +0000 James Gray 1339315 at http://www.linuxjournal.com