74 entries found:
) Next »
OpenSSH is the implementation of the SSH protocol. OpenSSH is recommended for remote login, making backups, remote file transfer via scp or sftp, and much more. SSH is perfect to keep confidentiality and integrity for data exchanged between two networks and systems. However, the main advantage is server authentication, through the use of public key cryptography. From time to time there are rumors about OpenSSH zero day exploit. Here are a few things you need to tweak in order to improve OpenSSH server security.
Another long-time Windows user has reached an inflection point. Mike Perkowski, a 30-year veteran of business and technology journalism, is ready to scrap his Windows PC. The veteran of PC magazine, CMP Media and Ziff Davis Media suffered a Windows meltdown days ago. Now COO of Microcast Communications, Mike's days with Windows appear over. But should he go with Mac OS or perhaps even Linux? Here's his horror story. He welcomes your advice on what to do next.
DNS server can be attacked using various techniques such as:
[a] DNS spoofing
[b] Cache poisoning
[c] Registration hijacking
One of the simplest ways to defend is limit zone transfers between nameservers by defining ACL. I see many admin allows BIND to transfer zones in bulk outside their network or organization. There is no need to do this. Remember you don't have to make an attacker's life easier. Restricting zone transfers with IP addresses in BIND DNS Server
Comodo today the launch of Red Hat- and CentOS-based versions of their back office server suite, Zero Touch Linux (ZTL)
. ZTL is a complete suite of Linux server applications centrally controlled by a user friendly web-based interface. The new versions compatible with Red Hat and CentOS, join the existing Trustix Secure Linux based version - providing administrators with greater flexibility and choice.
The Comodo Trustix team is proud to announce the release of Trustix Secure Linux 3.0.5, an update to the previous "Tikka Masala". The new releases is named "Mirch Masala" to describe the new interesting changes associated.
And here we go with the last release candidate before we explode with the final of 3.0.5. With special requests we have added something newer and more:..
We are pleased to announce that the third Beta release of Trustix Secure Linux 3.0.5 is now available. Thanks to many reports and suggestions, this release contains some critical fixes and improvements in the installer and other software.
Return values are not just important but as age has taught me - essential. Use return values to your advantage and wrangle them when you can. Breaking things out helps, but making sure you let everyone know that you did break out some code might be just as important.
We are proud to announce the first Beta release of the long awaited Comodo Trustix Secure Linux 3.0.5.
LXer Feature: 04-Aug-2006
GNU/Linux -- Like No Other Hotrod, Ever
While others appear to be going backwards, Linux just keeps racing ahead.
'Linux supports more devices, "out of the box", than any other operating system ever has.'
"Yes, that's right, we support more things than anyone else. And more than anyone else ever has in the past. Linux has a very long list of things that we have supported before anyone else ever did."
-- Greg Kroah-Hartman, OLS 2006 Keynote
Backing Up and Restoring Using the cpio Command in Linux and Unix
Trustix Secure Linux has been your choice for a Stable and Secure Linux. Trustix has been going through a rough period with its loss of Talented and skillful developers, but its time for us as a community to move forward and develop this great distribution. Sincere thanks to Erlend Midttun, Christian Haugan Toldness and Oyestein who have given their best to making a Successful, Stable and Secure (SSS) Distro.
Scheduling Backup Jobs using at and crontab
Trustix Secure Linux is an interesting distro for servers that is designed to be all about security. While Linux, in general, is fairly secure, a distro that focuses on security and stability from the ground up should be a good choice for Internet servers. In our testing, we found Trustix lives up to its intentions.
A good, quick review of Trustix Secure Linux.
ISPConfig released version 2.2.0 yesterday, featuring a new installer, support for 64-bit processors and the option of running it on Slackware and Trustix Linux the same day
that Tectonic ran its review on version 2.1.2. On Digg.com
March 2, 2006 Lüneburg, Germany, Dallas, Texas. Today, Till Brehm announced the release of ISPConfig version 2.2.0
, which is available immediately for download. ISPConfig is the leading Open Source remote web administration tool on the market. The turn-key application is free, now supports x86_64 systems and provides a secure remote graphical interface.
ISPConfig 2.2.0 is available for download.
Trustix today highlighted a surge in interest in Trustix Secure Linux since making the distribution freely available. A huge growth in downloads in the six weeks following the introduction of the new build confirms recent reports from independent site monitoring organizations of increased interest in the OS.
A huge growth in downloads in the six weeks following the introduction of the new build confirms recent reports from independent site monitoring organizations of increased interest in the OS.
We have just released
Trustix Secure Linux 3.0TSL's rapidly expanding new user base has identified a wide range of possible improvements which have now been implemented and made available in this release. Foremost amongst these is the new installer"Viper"... Other additions to the system include X.org X11 libraries, FreeRadius support, easy PXE installs, Mini CD and Net CD versions of the OS, enhanced hardware detection, installation on RAID and logical volumes and a range of kernel upgrades including the shift to Linux 2.6 kernel and BASH 3.
We have just released Trustix Secure Linux 3.0
Trustix answers high Linux TCO concerns by pointing to superior patching capabilities of SWUP automated update mechanism.
This is to announce the availability of Trustix Secure Linux Installation ISO images for downloading via BitTorrent.
This is to announce the second release candidate for Trustix Secure Linux 3.0. Amongst the many enhancements to the new Trustix Installer "Viper" is PXE support. Instructions on how to install over the network using PXE is found in the file /pxeboot/README.txt on the installation CD.
Trustix Secure Linux 3.0 has now reached beta status! Our rapidly expanding new customer base has meant we only had to concentrate on one area of improvement - making installation really, really simple.
Our rapidly expanding new customer base has meant we only had to concentrate on one area of improvement - making installation really, really simple. "Viper" our new installer should meet everyone's needs....customers old and new, and many new features are ideal for our growing enterprise community.
Last week OSDir.com surpassed their 100th Linux and open source screenshot tour, which has become an invaluable resource to the open source community.
It's official! Linux is the world's fastest growing operating system, and with version 2.2 Trustix continues to demonstrate day on day why this is so.
The Trustix Team is proud to announce Trustix Secure Linux 2.1.50 nicknamed Wonderboy. It is the first beta for the upcoming 2.2 release.
The scanning engine has been rewritten and is now faster, gentler against target hosts and now able to scan many hosts in parallel.
Secure Linux distribution maker Trustix recently launched a software-pricing scheme aimed at users in the server hosting market.
HOST INDUSTRY REVIEW) -- Trustix (trustix.com), developer of the Linux-based server System is a key component of the company's digital certification services.
zen-parse discovered a buffer overflow vulnerability in the ISO9660 filesystem component of Linux kernel which could be abused by an attacker to gain unauthorised root access. Sebastian Krahmer and Ernie Petrides developed a correction for this.
) Next »