Jump to content

Linux Websites Hacked ~Security news


PenTester

Recommended Posts

Actually, we used to store them in plaintext, but now we store them as an md5.

 

You shouldn't broadcast what hashing algorithm you use :) And md5 isn't so secure anymore.

 

I always think it's funny that people are concerned about database encryption when they're more likely to expose their password over unencrypted HTTP.

Link to comment
Share on other sites

  • 3 weeks later...

How many, hdhdhd?

 

Linux was only vulnerable because any person could find the source code and analize it to find weakness. May I remind you of how many day zeroes have been found for windows 8 already

 

Still Linux is more secure than out of the box Windows. I will still use Windows but will practice OS hardening to remove or disable any unnecessary services, applications, ports, etc.

 

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

 

I am never shocked to hear of a security breach. As much as people try to prevent breaches, for the most part they are applying technologies that are already in place. They have no idea what new technology or hacker tool will pop up. Modified technology is one thing but those who create from scratch will always blow the minds of security people.

 

In other words you cannot help but be reactive instead of proactive to the many cutting edge attacks. If you have no concept of something then how can it be prevented?

Link to comment
Share on other sites

Everything can and will be hacked one day.

Windows is the most under attack cause it's (was) the most used OS, so hackers focused on Windows.

 

Now Mac and Linux are growing in users, hackers are starting to focus on them too.

And they will find bugs to exploit...

Link to comment
Share on other sites

Linux is much harder (even impossible) to exploit if configured correctly. However, the biggest problem in defending against hackers is, and always will be, the user. No matter what measures you put in place, the user is always going to be the one who clicks the button "allow escalated privileges," causing whatever virus to gain root/administrator access to the computer.

Link to comment
Share on other sites

People are the weakest link.

 

Even with great software, hardware and physical security measures, people can and will introduce

viruses and other security breaches into your network.

This can be done through the introduction of physical media, such as music CDs that were burned at

home or pen drives loaded with corrupt data and even bypassing security measures to access

questionable websites.

The latter is usually done by the guy who has just enough technical knowledge to be dangerous. It could

also be the employee that wants to download their favorite MP3 or that can't wait until they get home

to check their Facebook wall. While you can disable the ability to use flash or pen drives on their

computer and filter the websites they access, there also needs to be strict policy that is taught to the

employees in continuing training sessions. These policies are setup to keep people from inadvertently

jeopardizing network security. Using common sense is always a bonus. If your employees or customers

learn to avoid questionable software, sites and email messages you can avoid a myriad of security

problems. Still, with all these precautions in place, you have some who just don't care. Proper logging

may help to weed out these people for retraining, reprimand or dismissal but there will always be a need

for non-human intervention. - http://360DegreeNetworking.com

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...