Generate enterprise-grade SSH keys and load them into an agent for control
of all kinds of Linux hosts. Script the agent with the Parallel Distributed
Shell (pdsh) to effect rapid changes over your server farm.
Phishing is one of the most dangerous threats to modern
computing. Phishing attacks have evolved from sloppily written mass email
blasts to targeted attacks designed to fool even the most cautious
users. No defense is bulletproof, and most experts agree education and
common sense are the best tools to combat the problem. more>>
A KMail bug has inadvertently sent PGP encrypted emails in plain-text — for the past four years! A flaw in the ‘Send it Later’ feature, introduced in Kmail 4.11, allows users to schedule the time and date that emails are sent. Unfortunately, the feature was incompatible with the client’s OpenPGP implementation. This resulted in encrypted emails […]
This post, KMail Bug Sent Encrypted Emails in Plain-Text — for 4 years, was written by Joey Sneddon and first appeared on OMG! Ubuntu!.
Plasma Vault makes it quick and easy to create an encrypted folder on the KDE Plasma desktop in which to store files and other data you wish to keep private.
This post, Plasma Vault Makes It Easy to Create Encrypted Folders on the KDE Desktop, was written by Joey Sneddon and first appeared on OMG! Ubuntu!.
Ubuntu has disabled guest session logins for Ubuntu 17.04 & 16.10 after finding a security vulnerability that could allow unintended access to user files.
This post, Security Flaw in Ubuntu Login Screen Could Let Anyone Access Your Files, was written by Joey Sneddon and first appeared on OMG! Ubuntu!.
Microsoft Windows is usually a presence in most computing environments, and UNIX
administrators likely will be forced to use resources in Windows networks from
time to time. Although many are familiar with the Samba server software, the matching
smbclient utility often escapes notice.
These days, it’s more important than ever to tighten up the security on
your servers, yet if you were to look at several official hardening
guides, they read as though they were written for Red Hat from
2005. That’s because they were written for Red Hat in 2005
and updated here and there through the years. more>>