Showing headlines posted by kprojects
« Previous ( 1 2 3 4 5 6 7 8 9 10 ... 11 ) Next »Moderate nss / nss-util / nspr security updates
There have been updates to the nss, nss-util and nspr packages to address moderate security flaws (CVE-2016-1978, CVE-2016-1979). The new packages are syncing through the various mirrors currently.
CVE-2016-0774 Linux Kernel moderate vulnerability
Recently it was found that the fix for this issue incorrectly kept buffer offset/length in sync on a failed atomic read. This could result in a pipe buffer state corruption – and a local, unprivileged user could use this to crash the system / leak kernel memory to the user space.
Use gsh to run the same command on multiple servers
At some point you will find it very handy to be able to run the same command on multiple servers. Sure, you could just put a list of IPs in a file and run something against it using a for loop, but gsh is going to make your life much easier.
Update openssh for CVE-2015-5600 and CVE-2016-3115
On March 21st, the openssh package was updated to patch two moderate vulnerabilities; CVE-2015-5600 and CVE-2016-3115.
Internet Protocol version 6 (IPv6) Basics
The Transmission Control Protocol/Internet Protocol (TCP/IP) is a widely used networking protocol, currently version 4. Its use on the Internet has broadened its popularity since it is the only protocol used on the Internet. Since the original use of the protocol was for military purposes there was no thought of growth.
TCP/IP Protocol: Network Time Protocol (NTP)
The Network Time Protocol is one of the oldest protocols in the TCP/IP Protocol Suite. The protocol was designed in 1985 by David L. Mills of the University of Delaware. As of June 2010, NTP has a current version of 4, sometimes referred to as NTPv4.
Partition Tables
Many computer users are familiar with the basic idea of filesystems. A storage device is divided into partitions each formatted to a particular filesystem that holds files. Well, just as the filesystem hold the files, a partition table holds the filesystems. There are a few partition table types. The most commonly known one is MBR.
Python3 Scripting (Part 1?)
Many Linux users know at least some shell scripting due to its importance. However, many users are not aware of the importance of Python scripting in Linux. True, shell scripting is more important than Python scripting, but Python is a very useful scripting tool in Linux. This is a general tutorial for Python3.
Migrate mail from one server to another with imapsync
Have you been in the situation where you needed to move everyone’s mail from one provider to another? It’s a pain to do using the mail client one at a time, but with this guide, you’ll be able to create a csv with everyone’s info and run one command to fire it all off.
Google Authenticator For SSH
For a long time its been stated that to secure your Linux machine you should change the default port number of services such as SSH and your favorite web server. While this is still a good step to take if you’re overly paranoid (or tired of port scanning alerts…), there’s got to be better ways to do this, right? Well, you would be correct! Here we will secure SSH with Google Authenticator to create a two-factor authentication method.
Installing Ubuntu
For those of you needing to install Ubuntu for the first time, you may not be sure how to install Ubuntu or what steps are included in this install. Thankfully, you found an article that may help you completely. In this tutorial, I will walk the readers through the whole installation process of Ubuntu 13.04 (Raring). The previous and most likely future versions are the same plus or minus a few options.
Tor: Part 3 - Becoming An Onion
In the previous article we set up Tor and was able to successfully use it to browse the web securely. Now we’ll take it a step further and become part of the Tor browsing network. As being an exit node holds a bit more power we’ll take it a step back and be a relay node. This means that traffic will flow in and out of our network, but no one can see it coming from us or somewhere else. Tor also states that this can provide better anonymity than just running it as a client.
The Linux Kernel: Configuring the Kernel Part 9
The Novell networking protocol, IPX, is commonly used between Windows systems and NetWare servers (The IPX protocol). IPX stands for Internetwork Packet Exchange. This is a network layer that is commonly used with the SPX protocol that is the transport layer.
Converting Installation Files
To install software on Linux systems, users will be using one of many installation-file formats. However, each Linux distribution only supports one or more types of installation files. For instance, RedHat-based systems use RPM files for installing new applications. A Debian-based system cannot read an RPM file. So, what if a RedHat user finds an application that they want to install, but the installation-file is a DEB file? Thankfully, there is a program called Alien that can convert installation-files.
New Implementation of a Log-structured File System (NILFS)
The NILFS file system was created by Nippon Telegraph and Telephone Corporation (NTT) at the Research and Development department of CyberSpace Laboratories. NTT was established in 1952 as a Japanese telecommunications company owned by the government. NILFS was released under the General Public License (GPL).
Tor: Part 1 - Is it for me?
Tor is a very popular piece of software used to encrypt communications. While it does have its weak points it also has its strong points as well. I’ll be walking through in a series of guides showing how to set it up, configure it and even make your own exit node (explanation to come soon).
Installing Web Browsers
Many, if not all Linux users, have at least one web browser installed on their system. Linux users have a variety of browsers to choose from. Most users use a stable, mainstream version while some developers use developmental versions to help test the software for the web browser's programmers. This tutorial will explain how to install some of the web browsers, both the stable and unstable versions.
Linux Bootloaders
Linux has a few bootloaders to choose from. Usually, Linux administrators leave the distro's default bootloader installed. Sometimes administrators need to use a different one or the distro's installer gives the administrators a choice between bootloaders. Clearly, it helps to know about the different Linux bootloaders.
Encrypted Containers Without TrueCrypt
A lot of people use TrueCrypt to create virtual drives/containers to encrypt files, and it works wonders when you’re using Windows, because Windows has no built-in support for such technology. However, in the world of Linux, we’ve been fortunate to have this for a vast amount of time!
Flash Friendly File System (F2FS)
The Flash Friendly File System (F2FS) is a file system created by Samsung. It was released with Linux kernel 3.8 in February 2013.
The free space is stored in a bitmap file. The bitmap file is a set of bits, each representing a block of the storage unit. If the block is unused, the bit is set to show it is unused. When a block is used, the bit is set to show its status as used. The files and directories are tracked in a table.