Tomb, a Successor To TrueCrypt For Linux Geeks

Original Article 
from the tomb-is-a-nice-friendly-word dept.

jaromil writes:

Last day we released Tomb version 2.1 with improvements to stability, documentation and translations. Tomb is just a ZSh script wrapping around cryptsetup, gpg and other tools to facilitate the creation and management of LUKS encrypted volumes with features like key separation, steganography, off-line search, QRcode paper backups etc. In designing Tomb we struggle for minimalism and readability, convinced that the increasing complexity of personal technology is the root of many vulnerabilities the world is witnessing today — and this approach turns out to be very successful, judging from the wide adoption, appreciation and contributions our project has received especially after the demise of TrueCrypt.
As maintainer of the software I wonder what Slashdot readers think about what we are doing, how we are doing it and more in general about the need for simplicity in secure systems, a debate I perceive as transversal to many other GNU/Linux/BSD projects and their evolution. Given the increasing responsibility in maintaining such a software, considering the human-interface side of things is an easy to reach surface of attack, I can certainly use some advice and criticism.

Posted by timothy 2 days ago

Malware Attack Infected 25,000 Linux/UNIX Servers

from the sudo-configure-your-stuff-properly dept.
wiredmikey writes

20140322-150832.jpg

Security researchers from ESET have uncovered a widespread attack campaign that has infected more than 25,000 Linux and UNIX servers around the world. The servers are being hijacked by a backdoor Trojan as part of a campaign the researchers are calling ‘Operation Windigo.’ Once infected, victimized systems are leveraged to steal credentials, redirected web traffic to malicious sites and send as many as 35 million spam messages a day. ‘Windigo has been gathering strength, largely unnoticed by the security community, for more than two and a half years and currently has 10,000 servers under its control,’ said Pierre-Marc Bureau, security intelligence program manager at ESET, in a statement.

There are many misconceptions around Linux security, and attacks are not something only Windows users need to worry about. The main threats facing Linux systems aren’t zero-day vulnerabilities or malware, but things such as Trojanized applications, PHP backdoors, and malicious login attempts over SSH. ESET recommends webmasters and system administrators check their systems to see if they are compromised, and has published a detailed report presenting the findings and instructions on how to remove the malicious code if it is present.

Everything You Wanted To Know About The Linux Kernel

Original article

20140318-091713.jpg

We demystify the Linux Kernel by bringing forth some features that are common to all versions of Linux OS.

Wednesday, September 25, 2013: Linux Kernel is a piece of code that is common to all versions of Linux. Proper understanding of the Linux kernel allows you to modify the operating system (OS) so as to incorporate support for the features you want. Every Linux kernel comes with these features:

20140318-091829.jpg

Multiuser – You can not only have multiple user accounts on a Linux system, but can also have multiple users logged in and working on the system simultaneously. Also, the users can arrange their own environments the way they want. It is possible to have user accounts password-protected, so that users can monitor who gets access to their applications and data.

Multitasking – In Linux, it is possible to have several programs running together, which means that you can not only have multiple programs running together, but that the Linux OS can itself have programs running in the background. Majority of these system processes make it feasible for Linux to work as a server with numerous background processes responding to the network for requests to log in to your system, display an Internet page, print a document, or copy a file.

Graphical user interface (X Window System) – The robust framework for working with graphical applications in Linux is dubbed as the X Window System (or simply X). X manages the functions of opening X-based graphical user interface (GUI) applications and showing them on an X server process (the process that controls your screen, mouse, and keyboard).

Hardware support – It is possible to organize support for roughly every type of hardware which can be connected to a pc. You can get support for floppy disk drives, CD-ROMs, removable disks, sound cards, video cards, tape devices, and lots of other things you can think of.

Networking connectivity – Linux provides support for a range of local area network cards to connect your Linux system to a network, modems, and serial devices. Additionally, LAN protocols, including Ethernet -both wired and wireless, all the most admired upper-level networking protocols can be integrated. TCP/IP is the most popular of these protocols is which is used for connecting to the Internet while other protocols, such as IPX and X.25 are also available.

Network servers – Linux provides best networking services to the client computers on the LAN and also to the entire Internet. It offers you a range of software packages to enable you to use Linux as a print server, file server, FTP server, mail server, Web server, news server, or workgroup (DHCP or NIS) server.

Application support – Due to the compatibility with POSIX and various other application programming interfaces (APIs), a large variety of freeware and shareware software is available for Linux. Majority of GNU software from the Free Software Foundation will run in Linux.

Source: searchitchannel.techtarget.com