@mike acker , Linux is open concept in which the code are seem many people while Microsoft & Apple are close concept.Linux indeed has a better control over it security but that does not meant it is...
Type: Posts; User: wacky_sung; Keyword(s):
@mike acker , Linux is open concept in which the code are seem many people while Microsoft & Apple are close concept.Linux indeed has a better control over it security but that does not meant it is...
Just as i mentioned in this thread and people take my word lightly and accuse of creating FUD. In a simple word to say the admin here are just cannot accept me for being transparency. Good luck with...
Ah...what make you think so. If you think so, i can recommend you to go to a site for test. Any damage is not my responsibility. A simple java exploit which still out in the wild inspite patch has...
This can be malware attack which has already infested your system with any outdated plugins of your browser or browser. Otherwise use as what people has recommended.
You cannot stop the leakage for data harboring while you are using their softwares / services such as google. What i will suggest you to prevent and protect yourself is total cut off your system from...
Actually i still feel that your iptables shall by default shall drop all connections from input, forward and output for security reasons. Then you start to allow by port and protocol. Anyway it is...
Is that complex?Haha...i still prefer manual install inregardless of it because i am in full control.
I think it is better for you to place your whole script here otherwise nobody can pinpoint to your right direction. If your script is more 50 lines, then i will suggest you to use a gui firewall...
If nothing is important down there. Format it is a quick way to your solution,otherwise it will consume lot of your time doing your forensic and troubleshooting.
Actually those certificate are not safe anymore after it has been discovered of a breach last year or early this year which mess up all those certification. What you need is some common sense and do...
To be honest, i am too lazy to read through the mess. The quick and easy way is do a complete removal and reinstalled it back.
Manually install.
https://sites.google.com/site/easylinuxtipsproject/java
FYI i used none which you have commended and what i need is my common sense. Most malicious sites are usually equipped with auto script injection using vulnerability and cookies by running my browser...
I think it is always better to have a backup plan than just wasting your time trying to restore.As long as you run a service open to the internet and you are prone to all kind of attacks in which you...
Personally i find that you got it all mix up and i do not recommend people to use WOT in which it is not reliable.
Definition of a computer virus.Very often people get all mix up.
Then this is your firewall issues in which you need to configure it to allow the remote access.
If the webpage you are viewing using java script, you can actually right click your mouse and view source of all html including the java script.
This will be interesting if you went to a phishing...
The VPN you using which you wanna remain anonymous while using your BT connection. Then the dns service configuration in your router is help you to remote login through SSH or others due to your...
Actually you need to look into all browsers addons or extensions beside Java.If you wanna safe, run it in virtual drive which save you all the trouble and...
Use a free dns service such as DNSdynamic or others to run your dynamic ip to use a static domain name through your router. Then configure your remote login through SSH / others depending what is...
Actually it can be done but it need for you to do some work to configure it. Beside that, it also depend on how you wanna do it.
I do agree with bodhi.zazen after reading the whole thread.:lolflag::lolflag::lolflag::lolflag::lolflag::lolflag::lolflag:
Linux overall has a better control.overlook by the whole community and patch faster as compare to Window OS. Even with Ubuntu running apparmor help to reduce the risk but after all it still run by...
In short, all OS is hackable but it is just the intent of how the user run it or uses it services such as running for a server.