Hello, I'd like to disable my account. Please delete everything that you can and disable the rest.
Thanks and best wishes to all!
Type: Posts; User: Ms. Daisy; Keyword(s):
Hello, I'd like to disable my account. Please delete everything that you can and disable the rest.
Thanks and best wishes to all!
See https://wiki.ubuntu.com/BasicSecurity/Firewall for a good guide in setting up a firewall on Ubuntu.
Is the default set to deny all in?
That.
Windows can be configured to be just as INSECURE as Linux.
Fact: they both have vulnerabilities.
Fact: a beginning to moderately skilled hacker can crack both.
Fact: they have different vulns...
This is becoming circular so I will present my final summary. For privacy use TorMail.
For maximum security stand up your own mail server.
For a mixture of security & privacy you have to...
I was addressing your statement refuting Google and large services as more valuable targets. My point is that where the valuable information lies depends on what you're looking for.
Linux desktops are far less targeted than Windows desktops. That does not indicate either's state of security. An attacker exploits a vulnerability . Both Windows and Linux have vulnerabilities....
What does that even mean- "break through Tor"? You mean determine the true sender of a Tor packet? It can and has been done. That affects privacy but not security. You have confused the two in your...
I don't understand what you're hoping to accomplish with the live CD.
If you want to have a secure setup then read the stickies in this forum and the basic security wiki.
...
The most common reason I hear for using AV on Linux is to prevent passing infections on to Windows machines. But unless you're willing to learn how to manage false positives, it will give you far...
Ah sorry, I missed this gem. Sometimes I wonder if it's better to let misinformation like this just stand. I certainly hope for your own sake that you're not breaking the law on TorMail because you,...
Yes Tormail will give you privacy. Just because it's hard for you to find doesn't make it hard for others to find. Obscurity (to you) != security. Ultimately it's just a mail server running on the...
Are you trying to set up a proxy?
What is your plan? Are you using the default setting which is denying all incoming and allowing all outgoing?
Unless you are running services you do not need to allow any in.
What? No. The default ufw rules will deny all incoming except for those specifically related to traffic you initiated.
Let's not argue facts, though......
No. A virtual machine is totally unrelated to your dual booted OS.
You have numerous options though. You could run windows with Virtual Box. Then install Ubuntu in a vm.
Contact the ISP.
Oh lol I misunderstood.
from this
http://www.epyxforensics.com/node/44
Thermite. ;)
As with most things in Linux there are numerous ways to accomplish the same thing. Just pick one you like.
No. He has a point- it's good practice to verify that the wipe successfully wiped the drive regardless of which you use.
If you hadn't found a good reason to update...
https://cyberarms.wordpress.com/2013/03/07/cve-2013-1763-gaining-root-access-from-ubuntu-12-10-guest-account/
/obligatory groan :)
adhd looks seriously fun. However I think it should come with a warning, much like Backtrack should "If you don't know what you're doing for the love of all that's holy, don't...
That is precisely my point! I've met more than one pro that confused the two.
Agreed. I wish there were a way to fix that. I was speaking more broadly- that there is a distinct difference between a quality penetration test and a Nessus scan launched by a script kiddie. It...