I've noted in the meantime that a scan with -sF always reports all ports closed, even when -sT finds something open.
Type: Posts; User: cogset; Keyword(s):
I've noted in the meantime that a scan with -sF always reports all ports closed, even when -sT finds something open.
That sounds really definitive - however, after "apt-get update" , I guess you still have to run "apt-get upgrade" followed possibly by "apt-get dist-upgrade" to finish the job?
Unless, the...
Alright, thanks everyone.
Thanks for the interesting replies: so not only version 0.4.3 is kinda outdated (although it's still the one you're stuck with if you are using older LTS versions such as Trusty), but actually the...
Yes, that definitely looks like an exercise... On regard to this I've never used it, will it really remove all the stuff from the PPA and then replace it with packages from the official...
Keepassx 0.4.3 in Trusty - not that the OS may matter here, as I've seen this reported for MacOS as well.
As I've said, it is an issue with Keepassx, but its forum is hardly useful as questions...
It's not clear to me at this point if the last two replies were intended for me (I suspect not), in any case I do have a firewall in place with a default deny incoming/allow outgoing policy and no...
I'm asking here because the Keepassx forum looks kinda useless, as the question I'm going to ask here has apparently been asked before and even submitted as a bug report, to no avail.
The issue...
I've added a couple of PPAs a while ago to my Trusty installation, now thinking again about it I'd like to completely remove those, as in replacing the packages installed by those PPAs with default...
I'd find it strange, but anything is possible. But I don't think I have anything listening, as I've removed stuff such as bluetooth, avahi, ssh and so on. As for the even numbered ports, no, it...
Why would wireshark (or tshark, for that matter) affect this? Isn't it just a passive monitoring tool, meaning it should not open any port or send any packet ?
I'll somehow bump this with a specific question: if I have a custom Firefox installation in /opt/firefox , how do I copy the existing default profile for the standard Firefox installation and modify...
Out of curiosity, I' ve scanned again my computer from itself using
sudo nmap -sT -f -vv --reason --version-intensity 9 -T normal -p 1-65535 192.168.x.xxx
and as usual random highly numbered...
Interesting, but if one has to fiddle with this script to somehow selectively grant privileges and limit internet access, wouldn't for instance QubesOS take this concept (networking in an...
If what the OP is saying is the same thing that I've seen sometimes, that would not be possible: the ports close almost instantly, by the time the scan is finished there's nothing to look at.
...
Besides what has been explained above, to somehow counteract this issue Tails for instance advises to download the key from different computers placed in different locations and check that they match...
I've noticed that some updates from trusty-proposed were installed in ubuntu trusty a couple of days ago by the update manager, this one http://packages.ubuntu.com/trusty-updates/systemd and some...
I'd agree with that, it is a legitimate question IMHO. I also seem to remember (contrary to what other are saying here) that the hashes indeed matched the altered ISO images, and that allegedly part...
I've been reading around and trying to figure out Apparmor profiles for a while, yet I still can't quite grasp how do they work.
I've also tried (some time ago) to use automated tools to generate a...
Is there an Ubuntu security notice for this? Has it been fixed yet?
Certainly not very wise or safe, either.
That's because it's not an user-facing (regular) website, it's a third-party service that you don't need at all: NoScript, as suggested, will take care of this.
I'd also suggest to insert this...
Maybe something like
watch -n2 ss -aptn state syn-sent may also help here, allowing you to spot which connections are trying to go through but can't, because something is blocking them.
...
But because they won' t have to interface correctly with system libraries any more as they will provide their own, won't this eventually make it easier to use malicious ones bundled with the app...
True that ;) looks like we're going to get what we always asked for...
I forgot to say that I'm using Ubuntu-MATE 15.10 because there was no official 14.04 version: so I really have to upgrade...