1. tinfoil-hat

    RegreSSHion SSH Vulnerability SSH is Vulnerable with Remote Code Execution
  2. H

    D2W OS - anonymous and secure OS

    With great pleasure and a sense of pride from the amount of work done, we present to you our secure and anonymous D2W OS! Features: ▫️ Unique screen lock with hidden password entry ▫️Simple and easy installation ▫️ Instant shutdown, removal and complete cleaning of the system in an emergency...
  3. K

    I leaked my IPv6 address and MAC address, should I be worried

    I have a computer that stopped accessing the internet and I haven't been able to figure out the issue, so I went on another forum to ask for help. I was urged to post the results from command ip a && ip r because I was told that's the most basic network diagnostic. So I posted it. Then I...
  4. hal_sk

    Firewall basic settings

    Hello, I run VPS with public IP with mail and web server on it. I have heard it might be good idea to set up a firewall. So I did these ufw settings, hoping, it will only allow ssh, mail and web related ports. And then rebooted VPS. Status: active Logging: on (low) Default: deny (incoming)...
  5. B

    Impulse XDR 1.10 released: Real-time threat detection & integrity monitoring for Linux platforms

    Hello! Deploying the next-generation of security telemetry technologies is hard, so I’m building Impulse, a fully automated XDR platform that leverages tools like Osquery and eBPF to provide real-time threat detection & integrity monitoring for servers and workstations. It detects malware from...
  6. K

    Troubleshooting tool security - BrosTrend wifi adapter

    Hi, I'm fairly new to linux and don't know much about network security. I bought a wifi adapter trying to improve my raspberry pi 3B+ wifi signal and ran into some troubles. I contacted BrosTrend to help me fix the issues and they asked me to run their troubleshooting procedure and send them a...
  7. A

    Total file system inode count; Web Server / VPS / Security

    Hi, my first post here and hopefully asking a simple question will get me a simple or reasonably simple answer. Using the Linux terminal how do I determine how many inodes the file system was setup with initially? My server came under inode attack two days ago. I've never heard the phrase...
  8. L

    How can I unmount my windows partitions from linux in a dualboot?

    I want to make it so that linux doesn't have any access to my windows partitions.
  9. Terminal Velocity

    This deserves your attention: The value of privacy

  10. F

    Something is bruting my machine

    HI everyone, I need help ASAP because since 31's of October, my machine is being bruted by some malicious software, I wasn't be able to manage this so i'm asking for help here I provided an output from cat /var/log/auth.log
  11. PhantomShadow

    Multi-language input and study and security

    Greetings to all fellow mega-nerds I was curious what is being developed for multi-language inputs in Linux systems and how much security is a consideration. Like roughly half of the world I am able to speak a second language and was curious about alternative language inputs in Linux. As far...
  12. J

    Solved Linux security issues

    Background: I have a security clearance (inactive for now) and as part of that security clearance, I receive free online security classes and newsletters from the NSA or military, and I pay attention to those classes. So when I see questionable things, it makes me suspicious (and as one my...
  13. P


    pretty new to linux and i was wondering how can i get linux to look up some cams i set up around the house and how i can conect to them remotely icamrea 1000 is the one im trying to get going right now
  14. C

    Hide a NetworkManager connection's settings without affecting autoconnection

    Hello, Sorry in advance, this is a complicated one ! I am trying to authenticate workstations (running Alma Linux 8) on my network using 802.1x and EAP-TLS (with both a client cert and a private key installed on each workstations). My problem is, I do not want the users to be able to see...
  15. D

    Is It Possible to Jailbreak a Ring Doorbell?

    My neighbor across the street recently bought one of these because he wanted to keep an eye on his packages from amazon, and his wife wanted to feel safe when she's home alone with the kids. When we were talking about it, I politely mentioned that the data it collects goes right to Ring's...
  16. M

    Linux Privacy, Security & Libre - Let's Have a Chat

    Let me lay some foundations.. I can only speak for myself, but the reason I use Linux is because I don't want anything to do with Microsoft or Apple. I also use a DeGoogled Android phone - and I am constantly trying and playing around with Linux phones. I use a VPN, Firefox (recently dumped...
  17. D

    fail2ban do not block ip correctly

    Hi all, hope this is the right forum and correct section. I'm new to fail2ban and have some problems to get it running or better that it works as I expect it to work. My system is Ubuntu 20.04. My fail2ban (failban-client is in version 0.11.1) service is up and running (also restarted after the...
  18. P

    How i've used a recent vulnerability in linux to gain root access and troubleshoot a fedora desktop machine

    Recently i was attempting to downgrade from fedora 36-rawhide to fedora 35-stable, and during this process i've lost the sudo command, and didn't have a pre-existing root account, so i've later on tried to access rescue mode by editing the bootloader options, but as i didn't have root account...
  19. M

    Is Linux Deepin trusted?

    As you may know Deeping is one of the most beautiful Linux distros but there are some doubts about using it among Linux community. What do you think about it? Is it 100% safe to install and use it? Is there any privacy concerns regarding Deepin?
  20. smooth_buddha

    Lets talk Linux security! What security programs, CLI tools, GUi tools do you use to keep you linux system secure?

    Would love to hear what security tools, apps and programs any of you use to keep your system secure and safe, also any other security measures that you take like sandbox'ing or virtualization, or specific security based distros you like or prefur???? I personally use clamav and clamtk ...