NFS is not optimized for that type of usage. It's good at moving data in one direction quickly. If you're doing reads and writes like to a virtual disk or similar it will bog down. You should...
Type: Posts; User: Chayak; Keyword(s):
NFS is not optimized for that type of usage. It's good at moving data in one direction quickly. If you're doing reads and writes like to a virtual disk or similar it will bog down. You should...
Your cable modem connects to a LAN? Get a router so you have your own private IP space and don't have to worry about hiding from peers on it.
Anyone you connect to has your IP as thats the way torrents work. If you want to hide your IP then use a VPN or Proxy.
The NSA collects data based on specific criteria outlined in a collection request. Google knows way more about you than the government ever will. It's funny how people protest against NSA...
I wouldn't be so sure about that. Is that computer used for anything sensitive such as banking and online shopping? I have a few polymorphic malware samples that won't get a single detection on...
How are you connected to the internet?
Do you have remote desktop enabled?
Do you have an SSH server installed?
Are you using a weak password?
Yes, but not everyone is technically savvy with linux to configure things. The number one reason linux systems are compromised is weak passwords on SSH and FTP. The easiest thing that any user can...
AV can't delete malware it doesn't detect.
Some of the worst kinds of malware are the ones that sit quietly and collect information. Most modern malware is about money, so they want credit card...
I use to analyze malware for a living before being promoted to solutions engineering so I have a decent perspective on the question.
The truth about all Anti-Virus programs is they don't detect...
Well now the story is that it's a warrant canary because of some of the phrases used. There's so much misinformation and FUD that it's difficult to get to the truth of the matter. I'll go back to...
You're reading too much into it. That kind of password even if there are elements that could be words is perfectly secure.
Check https://www.grc.com/haystack.htm
Truecrypt 7.1a is still perfectly safe to use. Another group has already picked up the project and will continue development, and the code audit on 7.1a has shown no significant flaws so far.
The part where I mention that I'm a former spook and the developers may have discovered that they were compromised? Yeah, changed that when I saw the developers responded and just basically quit.
...
I would suspect that there's a high probability that the site change is legit. They key fingerprint used to sign the 7.2 executable is the same one used for previous releases. It's not impossible...
Host only network
Host: IP 10.255.255.10/24 <-----> VM Host only Int: IP 10.255.255.1/24 VM Host ext int: IP DHCP <----> PIX <----> Internet
GW 10.255.255.1
You need something like...
I've not done it in virtual box but I've done networks in VMware to test that had virtualized routers and firewalls. One interface needs to be host networking, and the other needs to be bridged. ...
UFW is perfectly fine as it's just a user friendly frontend for IPtables which is the standard Linux firewall even on high security systems and firewall specific distros. Keep in mind that a...
You could turn off update for a month and be OK as long as you're not running any servers. I've been in bandwidth restrictive environments before with BGAN satellite and operated without doing...
A good example of the current alarmist society where every threat has to be greatly exaggerated to draw in readers/viewers and keep them scared.
Ubuntu has UFW built in
Don't bother with AV under linux. The AV you can get in windows is much superior for obvious reasons. If the windows AV is worth anything it will prevent anything it knows...
I2P isn't very usable. It would help if you would describe the reason behind taking such measures. There are many solutions for online security based upon a realistic threat assessment. If you...
Or you are a blogger or journalist being critical of a country with a history of arresting critics.
TOR isn't a magic bullet. You have to be very disciplined when you use it. There's a long list of arrests of people that were using TOR to prove it. There are certain elements of OPSEC...
It's a commonly accepted security term and refers more to network isolation than the literal meaning.
http://en.wikipedia.org/wiki/Air_gap_(networking)
http://www.digitalintelligence.com/products/usb_write_blocker/
http://www.cru-inc.com/products/wiebetech/usb_writeblocker/
The first is the better choice. It does some clever tricks to make the...