Search:

Type: Posts; User: Chayak; Keyword(s):

Page 1 of 10 1 2 3 4

Search: Search took 0.01 seconds.

  1. Thread: NFS and LXC

    by Chayak
    Replies
    6
    Views
    2,026

    Re: NFS and LXC

    NFS is not optimized for that type of usage. It's good at moving data in one direction quickly. If you're doing reads and writes like to a virtual disk or similar it will bog down. You should...
  2. Thread: Privacy on LAN

    by Chayak
    Replies
    4
    Views
    607

    [all variants] Re: Privacy on LAN

    Your cable modem connects to a LAN? Get a router so you have your own private IP space and don't have to worry about hiding from peers on it.
  3. Thread: Privacy on LAN

    by Chayak
    Replies
    4
    Views
    607

    [all variants] Re: Privacy on LAN

    Anyone you connect to has your IP as thats the way torrents work. If you want to hide your IP then use a VPN or Proxy.
  4. [SOLVED] Re: How safe are my data when I use a Chromebook? (with Ubuntu)

    The NSA collects data based on specific criteria outlined in a collection request. Google knows way more about you than the government ever will. It's funny how people protest against NSA...
  5. Replies
    25
    Views
    1,471

    Re: Perils of Virus Removal [Help]

    I wouldn't be so sure about that. Is that computer used for anything sensitive such as banking and online shopping? I have a few polymorphic malware samples that won't get a single detection on...
  6. [ubuntu] Re: Temporary unresponsive login screen, after which two new accounts are discovered

    How are you connected to the internet?
    Do you have remote desktop enabled?
    Do you have an SSH server installed?
    Are you using a weak password?
  7. Replies
    23
    Views
    2,171

    Re: The Issue of Anti-Virus Scanners

    Yes, but not everyone is technically savvy with linux to configure things. The number one reason linux systems are compromised is weak passwords on SSH and FTP. The easiest thing that any user can...
  8. Replies
    23
    Views
    2,171

    Re: The Issue of Anti-Virus Scanners

    AV can't delete malware it doesn't detect.

    Some of the worst kinds of malware are the ones that sit quietly and collect information. Most modern malware is about money, so they want credit card...
  9. Replies
    23
    Views
    2,171

    Re: The Issue of Anti-Virus Scanners

    I use to analyze malware for a living before being promoted to solutions engineering so I have a decent perspective on the question.

    The truth about all Anti-Virus programs is they don't detect...
  10. Replies
    44
    Views
    4,876

    Re: F.Y.I. Truecrypt compromised/closed down

    Well now the story is that it's a warrant canary because of some of the phrases used. There's so much misinformation and FUD that it's difficult to get to the truth of the matter. I'll go back to...
  11. Thread: Entropy

    by Chayak
    Replies
    6
    Views
    702

    [ubuntu] Re: Entropy

    You're reading too much into it. That kind of password even if there are elements that could be words is perfectly secure.
    Check https://www.grc.com/haystack.htm
  12. Re: How do you encrypt a USB partition with the Twofish cipher and SHA-512 hash?

    Truecrypt 7.1a is still perfectly safe to use. Another group has already picked up the project and will continue development, and the code audit on 7.1a has shown no significant flaws so far.
  13. Replies
    44
    Views
    4,876

    Re: F.Y.I. Truecrypt compromised/closed down

    The part where I mention that I'm a former spook and the developers may have discovered that they were compromised? Yeah, changed that when I saw the developers responded and just basically quit.
    ...
  14. Replies
    44
    Views
    4,876

    Re: F.Y.I. Truecrypt compromised/closed down

    I would suspect that there's a high probability that the site change is legit. They key fingerprint used to sign the 7.2 executable is the same one used for previous releases. It's not impossible...
  15. Replies
    4
    Views
    1,233

    Re: Virtualbox with Grsecurity Guest OS Hardening

    Host only network

    Host: IP 10.255.255.10/24 <-----> VM Host only Int: IP 10.255.255.1/24 VM Host ext int: IP DHCP <----> PIX <----> Internet
    GW 10.255.255.1

    You need something like...
  16. Replies
    4
    Views
    1,233

    Re: Virtualbox with Grsecurity Guest OS Hardening

    I've not done it in virtual box but I've done networks in VMware to test that had virtualized routers and firewalls. One interface needs to be host networking, and the other needs to be bridged. ...
  17. Replies
    26
    Views
    2,254

    Re: So what about anti virus and such?

    UFW is perfectly fine as it's just a user friendly frontend for IPtables which is the standard Linux firewall even on high security systems and firewall specific distros. Keep in mind that a...
  18. Replies
    1
    Views
    513

    [lubuntu] Re: Installing security updates only .....

    You could turn off update for a month and be OK as long as you're not running any servers. I've been in bandwidth restrictive environments before with BGAN satellite and operated without doing...
  19. Replies
    7
    Views
    974

    Re: Linux Trojans- panic in 5...4...3...

    A good example of the current alarmist society where every threat has to be greatly exaggerated to draw in readers/viewers and keep them scared.
  20. Replies
    26
    Views
    2,254

    Re: So what about anti virus and such?

    Ubuntu has UFW built in
    Don't bother with AV under linux. The AV you can get in windows is much superior for obvious reasons. If the windows AV is worth anything it will prevent anything it knows...
  21. Replies
    13
    Views
    914

    Re: Everything Privacy

    I2P isn't very usable. It would help if you would describe the reason behind taking such measures. There are many solutions for online security based upon a realistic threat assessment. If you...
  22. Replies
    13
    Views
    914

    Re: Everything Privacy

    Or you are a blogger or journalist being critical of a country with a history of arresting critics.
  23. Replies
    13
    Views
    914

    Re: Everything Privacy

    TOR isn't a magic bullet. You have to be very disciplined when you use it. There's a long list of arrests of people that were using TOR to prove it. There are certain elements of OPSEC...
  24. Replies
    13
    Views
    1,193

    Re: Technical data theft

    It's a commonly accepted security term and refers more to network isolation than the literal meaning.
    http://en.wikipedia.org/wiki/Air_gap_(networking)
  25. Replies
    13
    Views
    1,193

    Re: Technical data theft

    http://www.digitalintelligence.com/products/usb_write_blocker/
    http://www.cru-inc.com/products/wiebetech/usb_writeblocker/

    The first is the better choice. It does some clever tricks to make the...
Results 1 to 25 of 250
Page 1 of 10 1 2 3 4