"Early today, some party unleashed a massive DDoS attack against Dyn, a major DNS host. This led to a number of websites being completely inaccessible. DNS is the backbone of the Internet. It is the phone book that turns URLs into IP addresses. Without it, the Internet still works, but you won't be able to find anything"...
Read More...
https://hackaday.com/2016/10/21/you-might-not-be-able-to-read-this/
Why the Internet fell apart today...
I was one of the "lucky ones". I Was on Google Photos. Organizing my Videos and Pictures, most of the Day. I never even noticed, a thing. Unit, this evening at about 6PM. Someone came in and asked me if I knew about the "Cyber Attack" Today. So, I went to my Home Page. Where I read, all of my Tech News... And sure enough. I missed the DDoS Attack of the Year... So Far... I did notice, that my Web Server. Had been Down (offline) and Back up (online), this morning. "The monitor is back UP (HTTP 200 - OK) (It was down for 6 minutes and 16 seconds). I get e-mail notices. When my Server can't be Reached from the Internet. This sometimes happens. But, as long as it is for a short time. Then I don't worry about it. If, it happens for say, 30 minutes or so. Then I have to do something about it. Try and find the problem and fix it...
I pasted in a bunch of links to Security info below...
Read More...
https://hackaday.com/2016/10/21/you-might-not-be-able-to-read-this/
DDoS Attack Against Dyn Managed DNS
Incident
Report for Dyn, Inc.
Why the Internet fell apart today...
If you were on the internet on Friday morning, congrats! You were one of a lucky few who maintained their connectivity in the face of a massive, nationwide DDoS attack against part of the Domain Name System (DNS), a crucial piece of digital infrastructure which, when offline, cripples our ability to access the internet. But despite its importance, the DNS is often overlooked -- much like the rest of the behind the scene mechanisms that make the internet work. So before you go resetting your router to see if that clears things up (hint: it won't), let's take a quick look at what the DNS does and how it managed to break so spectacularly earlier today.
Read More and See the Videos on this Page...
https://www.engadget.com/2016/10/21/why-the-internet-fell-apart-today/
Read More and See the Videos on this Page...
https://www.engadget.com/2016/10/21/why-the-internet-fell-apart-today/
I was one of the "lucky ones". I Was on Google Photos. Organizing my Videos and Pictures, most of the Day. I never even noticed, a thing. Unit, this evening at about 6PM. Someone came in and asked me if I knew about the "Cyber Attack" Today. So, I went to my Home Page. Where I read, all of my Tech News... And sure enough. I missed the DDoS Attack of the Year... So Far... I did notice, that my Web Server. Had been Down (offline) and Back up (online), this morning. "The monitor is back UP (HTTP 200 - OK) (It was down for 6 minutes and 16 seconds). I get e-mail notices. When my Server can't be Reached from the Internet. This sometimes happens. But, as long as it is for a short time. Then I don't worry about it. If, it happens for say, 30 minutes or so. Then I have to do something about it. Try and find the problem and fix it...
I pasted in a bunch of links to Security info below...
- Don
Why the Internet Fell Apart Today - Early today, (10-21-16) Some party unleashed a massive DDoS attack against Dyn, a major DNS host. This led to a number of websites being completely inaccessible. DNS is the backbone of the Internet. It is the phone book that turns URLs into IP addresses. Without it, the Internet still works, but you won't be able to find anything.
- Why the Internet fell apart today
- The looming spectre of cyberwar with Russia
- Blame the Internet of Things for today's web blackout
- Huge DDoS attack takes down popular security researcher's site
- Evidence ties Russia to Podesta and Powell email hacks
- You Might Not Be Able To Read This | Hackaday
- Dyn on Twitter: "We are aware of the ongoing service interruption of our Managed DNS network. For more information visit our status page."
- Someone Is Learning How to Take Down the Internet - Schneier on Security
- Dyn, Inc. Status - DDoS Attack Against Dyn Managed DNS
- DynDNS & Domains - Domain Name Fowarding
- 301 Redirect - How to create Redirects - htaccess redirect
- Current IP Check
- DDNS Customers, Check Your Router Settings! | Dyn Blog
- D-Link DIR-655 Dynamic DNS
- Dynamic DNS Integrations - Dyn
- DynDNS.com - Support -- Tools -- Secret Registration
- Dyn Email Test Tool | My Dyn Account
- Free Internet Infrastructure And The Vendetta Against DDNS | Dyn
- Free Internet Infrastructure And The Vendetta Against DDNS | Dyn
- Free User Discontinuation FAQs - Dyn
- homeip.net goes to Free Domain Name with Dyn.com
- Htaccess Redirect Generator
- Linux Update Client: ddclient - Dyn
- Managed DNS | Email Delivery | SMTP | Domain Registration
- Remote Access - Dyn
- Search Engine Friendly Redirect Checker
- Update Client Configurator | My Dyn Account
- Webhops and Redirections - Dyn
- Hackers - Server Security DDos Attacks etc
- DonsDeals Blog: Why did the Internet Fall Apart Today? - Early Today (10-21-16) Some party unleashed a massive DDoS attack against Dyn, a major DNS Host
- Wikileaks has been under DDoS attack for the last five days | ZDNet
- WikiLeaks Back Up After Nine Days Of Sustained DDoS Attack | WebProNews
- Linux Today - A10 Networks Debuts Thunder DDoS Hardware (Linux Powered!)
- Chinese government linked to largest DDoS attack in GitHub history - TechRepublic
- Update:: Malware-infected home routers used to launch DDoS attacks | Computerworld
- Attackers hijack CCTV cameras to launch DDoS attacks | Computerworld
- Linux Today - Tux Machines Again Faces DDOS Attacks
- A Linux botnet is launching crippling DDoS attacks at more than 150Gbps | Computerworld
- DDoS mitigation may leave your site vulnerable - TechRepublic
- The anatomy of a DDoS extortion attempt - TechRepublic
- Your 4-step DDoS attack protection plan: What you can learn from Protonmail attack - TechRepublic
- Huge DDoS attack takes down popular security researcher's site
- Dyn, Inc. Status - DDoS Attack Against Dyn Managed DNS
- Update: Spamhaus hit by biggest-ever DDoS attacks - Computerworld
- Computer Security For Home and Small Business - Defending The Net
- Hacking SMTP Mail Gateways, email Spoofing, e-mail relaying
- Security - all Mixed info on Computers and the Internet
- 11+ security questions to consider during an IT risk assessment - TechRepublic
- 5 best practices to improve building management systems' cybersecurity - Cabling Install
- 5 biggest security failures of 2015 and who is still at risk - TechRepublic
- 5 ways to secure OS X - TechRepublic
- 9 days: Black-hat hackers' threshold in untargeted attacks - TechRepublic
- Adobe patches Flash to quash last two zero-days unearthed in Hacking Team's cache | Computerworld
- Adobe patches vulnerabilities in ColdFusion, Flex and Flash Player, including a zero-day flaw | Computerworld
- A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients - PETS2015VPN.pdf
- A Linux botnet is launching crippling DDoS attacks at more than 150Gbps | Computerworld
- Amazon resets passwords that might have been 'exposed'
- An insider's look at iOS security - TechRepublic
- Anonymous insiders reveal real hacking risks to nuclear power plants, report | Computerworld
- Anti Virus Companies Profit in Ugly PUP Game
- Antivirus software could make your company more vulnerable | Computerworld
- Apple iOS App Store riddled with malware -- XcodeGhost haunts hundreds of apps [u3] | Computerworld
- Apple's encryption battle with the FBI is over, for now
- Are Your Hacked Details Circulating On The Internet? | Gizmo's Freeware
- A troubling trajectory of malware and ransomware targeting OS X and iOS - TechRepublic
- Backspace Flaw Enables Linux Zero-Day Attack | Software | LinuxInsider
- Baidu Android app component puts 100 million devices at risk | Computerworld
- Best Free Internet Safety Check | Gizmo's Freeware
- BitLocker encryption can be defeated with trivial Windows authentication bypass | Computerworld
- Bits, Please!: Extracting Qualcomm's KeyMaster Keys - Breaking Android Full Disk Encryption
- Black Hat USA 2015 | Briefings
- Burr-Feinstein Encryption Bill
- Caution - Free USB Drives
- Check Your PC For Remnants Of Hacking Team Tools | Gizmo's Freeware
- CIOs wary of sharing cyberthreat data | CIO
- Coming soon to your smart TV: The next wave of cybercrime | Computerworld
- Comodo fixes bug that led to issue of banned digital certificates | Computerworld
- Comodo SSL Affiliate | The Recent RA Compromise
- CompTIA report: Almost half of companies believe their security is 'good enough' - TechRepublic
- Congress moves quickly on cyberthreat information sharing | Computerworld
- Cookie handling in browsers can break HTTPS security | Computerworld
- Court rules Shutterfly may have violated privacy by scanning face photos | Computerworld
- Cracking MD5, phpBB, MySQL and SHA1 passwords with Hashcat on Kali Linux - darkMORE Ops
- Critical flaw in NetUSB driver leaves millions of routers vulnerable | Computerworld
- Critical flaw puts 500 million WinRAR users at risk of being pwned by unzipping a file | Computerworld
- Cybercriminals adopt just-patched zero-day Flash exploit | Computerworld
- Cybersecurity bill approved, but what does it accomplish? | Computerworld
- Data breach at toy maker VTech leaked photos of children, parents | Computerworld
- Data convenience isn't a crime, but treating it as one should be | Computerworld
- Data held hostage; backups to the rescue | Computerworld
- DDoS mitigation may leave your site vulnerable - TechRepublic
- Department of Defense - Law of War Manual (June 2015) - law-of-war-manual-june-2015.pdf
- Design flaw in Intel chips opens door to rootkits | Computerworld
- Disasters in the Making: How I Torture Open Government Data Systems for Fun, Profit, and Time Travel - YouTube
- DOJ tightens policies on use of simulated cells for surveillance | Computerworld
- Download Older Versions of Software
- Download Older Versions Software for any Operating System
- Downloads - Rook Security
- Drupal Hardens Its Security in Response to Criticism
- Dyreza malware steals IT supply chain credentials | Computerworld
- Email Header Analyzer, RFC822 Parser - MxToolbox
- Encryption ransomware threatens Linux users — Dr.Web - innovation anti-virus security technologies. Comprehensive protection from Internet threats.
- Evil Versions of Popular Open Source Software
- Facebook to warn users about potential state-sponsored attacks | Computerworld
- Facebook was the victim of a backdoor hack
- Faux phishing scheme shows CIOs how hacks unfold | CIO
- FBI backs off Apple, finds another way into iPhone 5c
- File-encrypting ransomware starts targeting Linux Web servers | Computerworld
- Firefox helps you cover your assets with latest Tracking Protection feature - TechRepublic
- Firefox Security Warning - CVE - CVE-2015-4508
- Firewalls can't protect today's connected cars | Computerworld
- Five Tips to Avoid Tax Scams
- Former NSA and CIA director recommends managing consequences instead of vulnerabilities - TechRepublic
- F-Secure Router Checker | Is my DNS hijacked?
- Full Disclosure: WinRAR SFX v5.21 - Remote Code Execution Vulnerability
- Google researchers uncover a remote execution bug in FireEye appliances | Computerworld
- Got A Lenovo Laptop? You Need To Uninstall The Accelerator. | Gizmo's Freeware
- Hacker exploited Imgur flaw to secretly load over 450 background images and attack 8chan | Computerworld
- Hacker hijacks @Deray by redirecting his Verizon phone number
- Hacker: 'Hundreds of thousands' of vehicles are at risk of attack | Computerworld
- Hackers shut down power grid in Ukraine
- Has The Antivirus Industry Gone Mad? | Emsisoft Blog
- Has The Antivirus Industry Gone Mad? | Emsisoft Blog
- Hello Kitty hack exposes 3.3 million users, joins Hello Barbie in putting kids at risk | Computerworld
- How Adele became the latest celebrity hacking victim - TechRepublic
- How Safe Is Your Password? | BreachAlarm
- How to Check an Internet Link without Actually Clicking It | Gizmo's Freeware
- How to easily encrypt/decrypt a file in Linux with gpg - TechRepublic
- HP adds protection against firmware attacks to enterprise printers | Computerworld
- Hyatt Hotels says payment-processing systems hit by malware | Computerworld
- Improve Your Security: Check Your Router Hasn't Been Hijacked | Gizmo's Freeware
- Indegy - Our mission is to prevent industrial disasters by delivering products that defend against cyber attacks and enable operational excellence in ICS management
- Index of /tools/
- Is it time to replace passwords with passthoughts? - TechRepublic
- Is there an Internet-of-Things vigilante out there? | Communauté Symantec Connect
- Joint Chiefs of Staff emails targeted by Russian hackers | Computerworld
- JPMorgan says breach impacted 76M households and 7M small businesses | CSO Online
- Juniper Networks to rip out NSA-developed code amid new backdoor security concerns - TechRepublic
- Juniper updates list of backdoored enterprise firewall OS versions | Computerworld
- Juniper warns about spy code in firewalls | Computerworld
- Kill the hassle of password management with Google Apps SSO - TechRepublic
- LAPD hacks iPhone 5s, proves they don't need Apple backdoor - TechRepublic
- Leaked D-Link code-signing key could make malware look legit
- Let's Encrypt - Free SSL/TLS Certificates
- LifeLock pays $100M to settle FTC complaint of more false advertising | Computerworld
- Linux Grub massive flaw: Was it made by NSA in 2009? | Computerworld
- Linux Today - Drupal Hardens Its Security in Response to Criticism
- Linux Today - Mozilla Firefox 39.0.3 Hotfix Out Now to Patch a Critical Issue in the Built-in PDF Viewer
- Linux Today - TeamViewer Alternatives for Linux
- LogJam encryption flaw puts Web surfers at risk | Computerworld
- Logjam: How Diffie-Hellman Fails in Practice
- Logjam: PFS Deployment Guide
- Mac OS X ransomware: How KeRanger is a shadow of malware to come - TechRepublic
- Macs can be remotely infected with firmware malware that remains after reformatting | Computerworld
- Major attack on Cisco routers: Protect your enterprise from SYNful Knock - TechRepublic
- Make It Easier To Trace The Source Of Email | Gizmo's Freeware
- Malware goes to war: Potential tools, uses, and targets of cyberweapons - TechRepublic
- Mark Zuckerberg's lesser-known social accounts get compromised
- Microsoft Patch Tuesday: The patches keep coming | Computerworld
- Microsoft will benefit from LinkedIn's massive personal database, but privacy risks remain - TechRepublic
- Microsoft Word - Tier 1 Controls v2.docx - Tier-1-Controls-v2-2.pdf
- Microsoft Word - Whitepaper - Anatomy of the Attack Phishing.docx - Whitepaper-Anatomy-of-the-Attack-Phishing.pdf
- Millions of Android devices have flawed full disk encryption
- "Millions" Of Home Routers Vulnerable To Web Hack - Forbes
- Millions of Linux servers and PCs, 66% of Android devices vulnerable to serious 3 year old bug - TechRepublic
- Misconfiguration Exposes Hotel Routers to Risk
- Mozilla Firefox 39.0.3 Hotfix Out Now to Patch a Critical Issue in the Built-in PDF Viewer - Softpedia
- Mozilla issues quick fix for Firefox zero-day bug | Computerworld
- New attack campaign against SMBs uses a botnet to deliver PoS malware | Computerworld
- New malware infects ATMs, dispenses cash on command | Computerworld
- New remote access Trojan Trochilus used in cyberespionage operations | Computerworld
- North Korean hackers stole US fighter jet blueprints
- NSA Has Reverse-Engineered Popular Consumer Anti-Virus Software In Order To Track Users | TechCrunch
- NSA Spying on Foreign Anti-Virus Companies
- oclHashcat - advanced password recovery
- OpenSSH Flaw Exposes Linux Servers to Roaming Risk
- OpenSSH patches leak that could expose private SSH keys | Computerworld
- OPM: The worst hack of all time | Computerworld
- OPM underestimated the number of stolen fingerprints by 4.5 million | Computerworld
- Patch halt looms for half of all IE users | Computerworld
- Pawn Storm cyberspy group targets NATO, other gov't agencies | Computerworld
- Phishing Scams Lead with Fake CEO Emails
- Plenty of fish, and exploits, on dating website | Computerworld
- Probably The Most Reliable Source Of Security Patch Info | Gizmo's Freeware
- Project Zero
- Ransomware-as-a-service is exploding: Be ready to pay - TechRepublic
- Read the full Senate bill requiring encryption backdoors
- Report: 90% of mobile health and finance apps vulnerable to critical security risks - TechRepublic
- report_pubv2 - bencsathPBF11duqu.pdf
- Scan report for at UTC - VirusTotal
- Scan report for http://archive.defense.gov/pubs/law-of-war-manual-june-2015.pdf at 2015-11-25 21:24:10 UTC - VirusTotal
- Skimmers Hijack ATM Network Cables — Krebs on Security
- Software security holes
- SSH Frequently Asked Questions
- SSL/TLS/HTTPS: Keeping the public uninformed | Computerworld
- St. Louis Federal Reserve forces password change after DNS attack | Computerworld
- Tesla patches Model S after researchers hack car's software | Computerworld
- The anatomy of a DDoS extortion attempt - TechRepublic
- The Daily Dot (dailydot) 24 uploads | Scribd
- The Dark Arts: Hacking Humans | Hackaday
- The dark side of wearables: How they're secretly jeopardizing your security and privacy - TechRepublic
- The Juniper VPN backdoor: Buggy code with a dose of shady NSA crypto | Computerworld
- The myth of the cybersecurity skills shortage | Computerworld
- The NSA wants to spy on the Internet of Things
- The Risk of Open WiFi on Display at RSA
- Thousands of Java applications vulnerable to nine-month-old exploit | Computerworld
- Thousands of medical devices are vulnerable to hacking, security researchers say | Computerworld
- Three indicted in JPMorgan hacking case | Computerworld
- Top 10 security stories of 2015 | CIO
- Twitter 'confident' that 32 million usernames weren't hacked
- Unlike Mozilla, Google anticipated SHA-1 errors from HTTPS traffic inspection systems | Computerworld
- URL spoofing in reader mode — Mozilla
- Ways $460 million military contract for cyber bombs could attack targets | Computerworld
- Website Password hacking using WireShark - blackMORE Ops
- Why citizens need encryption as a fundamental human right - TechRepublic
- Why Linux Distros Look Insecure Even Though They're Not | FOSS Force
- Why the Linux Mint hack is an indicator of a larger problem - TechRepublic
- Why the NSA may not need backdoors - TechRepublic
- Windows and UEFI anti-theft mechanism makes systems less secure - TechRepublic
- Windows vulnerability can compromise credentials | Computerworld
- Wireshark makes locating bandwidth issues easy - TechRepublic
- XcodeGhost used unprecedented infection strategy against Apple | Computerworld
- Your 4-step DDoS attack protection plan: What you can learn from Protonmail attack - TechRepublic
- Zero-Day Exploit Found in Kaspersky Antivirus - UPDATED - Softpedia
- CYBERTHREAT REAL-TIME MAP - Kepersky MAP
- Untangling the NSA's latest alleged embarrassment
- Distributed Censorship or Extortion? The IoT vs Brian Krebs | Hackaday
- Insulin Pump Can be Hacked: Johnson & Johnson
- The FCC wants ISPs to get permission before sharing your data
- ICYMI: Airbag helmets might save your noggin
- Why the Internet fell apart today
- Routers, The Internet & YouTube Offline - Computerphile - YouTube
- Security - Bulletins Windows and Mac
- About the security content of Mac OS X v10.6.6
- Microsoft misses flaw in 2010 patch that was supposed to quash Stuxnet bug | Computerworld
- Microsoft releases emergency patch to stymie Windows Server attacks | Computerworld
- Microsoft Security Bulletin MS11-001 - Important: Vulnerability in Windows Backup Manager Could Allow Remote Code Execution (2478935)
- Microsoft Security Bulletin MS11-002 - Critical: Vulnerabilities in Microsoft Data Access Components Could Allow Remote Code Execution (2451910)
- Microsoft Security Bulletin MS14-068 - Critical
- Security - Congress Targets Cybersecurity and you're the Victim
- EFF Disappointed as CISA Passes Senate | Electronic Frontier Foundation
- GetFile
- John Brennan email hacked, U.S. investigates - CNNPolitics.com
- Teen says he hacked CIA director's AOL account | New York Post
- Internet E-Mail Hoaxes
- "A Card for You", "Virtual Card For You", or "Postcard" Virus Warning or hoax-Fiction! & Truth!
- Do not open any message with an attachment entitled POSTCARD FROM HALLMARK - Google Search
- hoaxkill.com
- HoaxKill.com - AboutUs Wiki Page
- hoaxkill.com - Google Search
- hoaxkill.com - Google Search
- hoaxkill.com - Google Search
- hoaxkill.com review - Google Search
- hoaxkill.com | WOT Reputation Scorecard | WOT Web of Trust
- Hoaxkill - hoaxkill.com - PageInsider.com
- hoaxkill Similar Sites, Find the best 20 websites like hoaxkill.com
- Olympic Torch (virus hoax) - Wikipedia, the free encyclopedia
- Postcard from Hallmark Virus Hoax
- Postcard from Hallmark Virus Warning.
- Postcard Image Virus Hoax
- 'Postcard' or 'Hallmark Postcard' Virus Hoax - Urban Legends
- Re: hoaxkill.com
- snopes.com: 'Hallmark Postcard from a Family Member' virus
- The Hoaxkill service: Let's get rid of hoaxes now!
- Internet Security
- eSecurity Planet
- Linux Security
- 4 security features in Fedora 16
- 5 Best Practices to Secure and Protect SSH Server
- Add Linux power to wireless routers with advanced tips and tricks for DD-WRT
- Audit the security of your Unix/Linux systems using lynis | Unixmen
- Delays beset the Linux Foundation's Secure Boot workaround | PCWorld
- Dr.Web - innovation anti-virus security technologies. Comprehensive protection from Internet threats.
- Fedora Linux Moves Forward with UEFI Secure Boot Plans | PCWorld Business Center
- How To Secure Apache2 With LinOTP | HowtoForge - Linux Howtos and Tutorials
- How to Secure Your Apache Web Server
- Improve Your Security Defense Using Backtrack Linux
- Kernel Developers Share Security Tips
- » Linuxaria – Everything about GNU/Linux and Open source An introduction to security models in Linux
- Linux community adopts UEFI technology
- Linux Foundation proposes to use UEFI to make PCs secure and free | ZDNet
- Linux Foundation: Secure Boot Need Not Be a Problem | PCWorld Business Center
- Linux News: Community: Canonical, the FSF and the Ongoing Secure Boot Saga
- Linux Security – Server Hardening | Pinehead.TV
- Linux Today - 6 arrested in Japan for distributing Android malware via porn site
- Linux Today - 75 Open Source Apps To Replace Popular Security Software
- Linux Today - Android 4.2 will scan your apps for safety
- Linux Today - Android users warned of fake app store malware risk
- Linux Today - An introduction to security models in Linux
- Linux Today - Audit the security of your Unix/Linux systems using lynis
- Linux Today - Black Hat Defcon: Can you hack a Linux Powered SOHO Router with DLNA?
- Linux Today - Built-in malware scanner for Android on the way?
- Linux Today - Can Morality Improve Security?
- Linux Today - Canonical, the FSF and the Ongoing Secure Boot Saga
- Linux Today - Coreboot: the Solution to the Secure Boot Fiasco
- Linux Today - Delays beset the Linux Foundation's Secure Boot workaround
- Linux Today - Fedora Linux Moves Forward with UEFI Secure Boot Plans
- Linux Today - Free Software Foundation vs Microsoft Windows 8 Secure Boot
- Linux Today - How To Secure Apache2 With LinOTP
- Linux Today - How to Securely Delete Data from Hard Drives
- Linux Today - How to Secure SSH with Google Authenticator̢۪s Two-Factor Authentication
- Linux Today - Improve Your Security Defense By Going On Offense Using Backtrack Linux
- Linux Today - ITwire: Secure Boot Microsoft Shows Up Linux
- Linux Today - Lawyer hopeful of success with secure boot complaint
- Linux Today - LibreOffice 3.5.5 Addresses Multiple Arbitrary Code Execution Vulnerabilities
- Linux Today - Linux Foundation Steps Into Windows 8 Secure Boot Flap
- Linux Today - Linux Security - Server Hardening
- Linux Today - Linux users targeted by password-stealing Wirenet Trojan
- Linux Today - Mandriva Business Server gets new apps and security fixes
- Linux Today - Metasploit 4.6 Makes Pen Testing Less Mysterious
- Linux Today - Microsoft mum on reasons for secure boot
- Linux Today - Mozilla Firefox 20 Improves Browser Privacy
- Linux Today - Mozilla Firefox 23 Will Block Mixed SSL Content
- Linux Today - Multi-Tenant Public Clouds: Security Risk or FUD?
- Linux Today - New Linux Rootkit Emerges
- Linux Today - Open Source GCC 4.8 Compiler Including Address Sanitizer Security
- Linux Today - Open source offense could be our best defense against cyberattacks
- Linux Today - Open Source Project Prepackages Kim Dotcom's Security
- Linux Today - SecTor: Old Security Vulnerabilities Live On
- Linux Today - Snort Founder Still Supports Open Source Security [VIDEO]
- Linux Today - Sourcefire Integrates Malware Detection with IPS (Linux Powered!)
- Linux Today - Sourcefire Pushes Open Source ClamAV Forward
- Linux Today - Taking Stock of Linux Security and Anti-virtus Needs
- Linux Today - The Hidden Security Risks of Legacy Software
- Linux Today - Top Cyber Threats: Security Research Roundup
- Linux Today - Torvalds clarifies Linux's Windows 8 Secure Boot position
- Linux Today - Webopedia Term of the Day: Collateral Hacking
- Linux Today - Why Are Web Applications a Security Risk?
- Linux Today - Windows 8 Secure Boot: Two Linux Distros Respond
- Linux Today - World IPv6 Launch Day: A Security Risk?
- Linux Top 5: Microsoft's Secure Boot Gambit
- Linux users targeted by password-stealing 'Wirenet' Trojan - Techworld.com
- Privilege escalation security hole found in Nvidia Linux driver | ZDNet
- Pwn2Own 2012 Gets Serious About Security Vulnerabilities
- Red Hat Engineer Calls out Windows 8 Secure Boot as a Linux Risk
- Red Hat Engineer Calls out Windows 8 Secure Boot as a Linux Risk - InternetNews.
- Secure boot: Microsoft shows up Linux
- Secure VNC Installation of Red Hat Enterprise Linux 6
- Set up a free and secure Terminal Server with Linux | TechRepublic
- Taking Stock of Linux Security and Antivirus Needs | The VAR Guy
- Technology News: Community: Linux Foundation Steps Into Windows 8 Secure Boot Flap
- The Air Force's secure Linux distribution
- Torvalds clarifies Linux's Windows 8 Secure Boot position | ZDNet
- Windows 8 Secure Boot: Two Linux Distros Respond | PCWorld Business Center
- The Dirty Cow Linux bug: A silly name for a serious problem | ZDNet
- Linux Today - The Dirty Cow Linux bug: A silly name for a serious problem
- Linux Security - users targeted by password-stealing 'Wirenet' Trojan
- Dr.Web - innovation anti-virus security technologies. Comprehensive protection from Internet threats.
- Dr.Web - innovation anti-virus security technologies. Comprehensive protection from Internet threats.
- Dr.Web - innovation anti-virus security technologies. Comprehensive protection from Internet threats.
- Google Translate - for http://vms.drweb.com/virus/?i=1957835
- Linux Security App - Lynis is an open source security auditing tool to evaluate the security defenses of their Linux Unix-based Systems
- Downloads - Lynis Enterprise Suite
- Get Started with Lynis - Installation Guide
- LBNL's Network Research Group
- Lynis control AUTH-9308: Protect single user mode
- Lynis control HTTP-6643: mod_security module
- Lynis control NETW-2705: Properly functioning name servers
- Lynis control PHP-2372: PHP expose_php option
- Lynis Documentation - Installation and Usage Guide
- Lynis - Security auditing tool for Unix/Linux systems
- mod_qos
No comments:
Post a Comment