Loading...

WordPress 4.1.2 Fixes Critical XSS Flaw

LinuxSecurity.com: The maintainers of WordPress announced a new version for the blogging platform, which is considered a critical security release that addresses a highly important cross-site scripting (XSS) vulnerability.

Share

Return of the Mac

In a previous article, I talked about vim macro basics. In that
article, I described how to record a custom macro, assign it to a key and then
use it to make automated edits to a BIND zone. I also teased that I
would cover more advanced uses of macros, like nested macros, in a future
issue. more>>

Share

More eBPF Improvements Heading To Linux 4.1

With the in-development Linux 4.1 kernel one of the new features is for eBPF programs to attach to Kprobes but now there’s more eBPF work headed for this next major kernel version…
Read more at Phoronix

Share

Linux Kernel 3.4.107 LTS Is Now Available for Download

Zefan Li announced on April 19 the immediate availability for download of a new maintenance release for Linux 3.4 kernel, an LTS (Long Term Support) version that is still used in many Linux kernel-based operating systems. According to the attached sh…

Share

The 4.0 Kernel Has Been Released

Linus has released the 4.0 kernel right on schedule. “Feature-wise, 4.0 doesn’t have all that much special. Much have been made of the new kernel patching infrastructure, but realistically, that not only wasn’t the reason for the version number chang…

Share

Not So Dynamic Updates

Typically when a network is under my control, I like my servers to have
static IPs. Whether the IPs are truly static (hard-coded into network
configuration files on the host) or whether I configure a DHCP server to make static
assignments, it’s far more convenient when you know a server always will have
the same IP. more>>

Share

Researchers Demonstrate Hack by Heat

Malware could pass data and commands between disconnected computers without leaving a trace on the network. 

Share

Flexible Access Control with Squid Proxy

Large enterprises and nuclear laboratories aren’t the only organizations
that need an Internet access policy and a means of enforcing it. My
household has an Internet access policy, and the technique I’ve used to
enforce it is applicable to almost any organization. In our case, I’m not
too concerned about outside security threats. more>>

Share

Security in Three Ds: Detect, Decide and Deny

Whenever a server is accessible via the Internet, it’s a safe bet that
hackers will be trying to access it. Just look at the SSH logs
for any server you use, and you’ll surely find lots of “authentication
failure” lines, originating from IPs that have nothing to do with you
or your business. more>>

Share

High-Availability Storage with HA-LVM

In recent years, there has been a trend in which data centers have been
opting for commodity hardware and software over proprietary solutions. Why
shouldn’t they? It offers extremely low costs and the flexibility to
build an ecosystem the way it is preferred. The only limitation is the extent
of the administrator’s imagination. more>>

Share

DNSMasq, the Pint-Sized Super Dæmon!

I’ve always been a fan of putting aftermarket firmware on consumer-grade
routers. Whether it’s DD-WRT, Tomato, OpenWRT or whatever your favorite
flavor of “better than stock” firmware might be, it just makes economic
sense. Unfortunately, my routing needs have surpassed my trusty Linksys
router. more>>

Share