Loading...

Archive for May, 2015

Linux 4.1 Kernel Benchmarks With An Intel Core i7 IVB System

Yesterday I ran some fresh tests of Intel Ivy Bridge on the latest Mesa Git code to see if the performance has changed much recently for the slightly-older generation of Intel HD Graphics. Today I’ve done some similar tests in kernel-space with the L…

Share

Wow! The SEO stuff I made is VERY successful!

Hey there! I just want to announce, that my SEO stuff is very successful! I have started with SEO two months ago with an alexa global rank of about 1,900,000, a Google pagerank of 2 (IIRC) and a Google search position for the searchstring “linux” of way below position 200. Since then, I’ve done many, many things to […]

Share

Freelance hacking site vows to clean up dodgy listings

LinuxSecurity.com: Charles Tendell is trying to repair a reputation problem for his website, Hacker’s List. The site debuted in November and quickly drew high-profile attention, including a front-page story in the New York Times. It’s an online market…

Share

Dr Hjkl on the Command Line

The first time I used vi was in a college programming course. It was the
default editor on the computer lab’s UNIX systems we used to compile our
assignments. I remember when our professor first introduced vi and
explained that you used the hjkl keys to move your cursor around instead of
the arrow keys. more>>

Share

Google Reveals the Problem With Password Security Questions

LinuxSecurity.com: Using one guess, an attacker has a 19.7 percent chance of guessing an English speaking user loves pizza, according to Google’s findings, which looked at hundreds of millions of questions and answers for account recovery claims.

Share

How I Got Here: Marcus Ranum

LinuxSecurity.com: Dennis Fisher talks with security pioneer Marcus Ranum about writing an early Internet firewall at DEC, the security gold-rush era of the 1990s and early 2000s, why he never patented most of the ideas he has come up with and how he f…

Share

eNom discloses DNS attack to customers

LinuxSecurity.com: On Thursday, Taryn Naidu, the CEO of domain registrar eNom, sent a letter to customers disclosing a “very sophisticated attack” that targeted the DNS settings on four domains.

Share

Tech companies ask Senate to pass NSA reform bill

LinuxSecurity.com: Reform Government Surveillance, an organization that represents large technology companies like Google, Apple and Microsoft, on Tuesday pressed the U.S. Senate not to delay reform of National Security Agency surveillance by extending…

Share

Btrfs RAID 0/1 Benchmarks On The Linux 4.1 Kernel

With the Linux 4.1 kernel coming together nicely I’ve begun my testing (separate from all the fully-automated Git testing done each day via the LinuxBenchmarking.com systems) of this new kernel under a variety of different workloads, stressing differ…

Share

Speed up the page, speed it up!

Hey peoples! I’ve just done some great optimizations in the database table structure with indexes and such things. I’ve also deactivated the translation tool (for now), because this is the great major problem when being logged in to the page. This tool slows down the page loading by about 6 seconds! So for now, this […]

Share

DDoS reflection attacks are back – and this time, it’s personal

LinuxSecurity.com: At the start of 2014, attackers’ favorite distributed denial of service attack strategy was to send messages to misconfigured servers with a spoofed return address – the servers would keep trying to reply to those messages, allowing …

Share

Top security tools in the fight against cybercrime

LinuxSecurity.com: Cybercrime is a massive global threat, and U.S. businesses are the No.1 target. For tips and advice about how best to defend against cyberattacks, Network World asked security pros to name their No.1, most valuable security tool.

Share