Here's my profile for xchat. I used abstractions, but I made sure they had no Px or Ux rules (as those give problems right now in AppArmor,...
Java is already profiled, at least for the browser. Flash is sandboxed by Chromium automatically.
Well first enable it and see what it does.. Post any logs from /var/log/syslog here.
The Chrome profile you posted doesn't sandbox the sandbox. The default Chromium profile that comes with Ubuntu does. I just use it and modify...
If on Ubuntu, it comes with a Chromium profile, but you will need to enable it. First you will need to install apparmor-utils from the repos....
Anonymous consists mostly of 18-24 year old useful idiots. There's a few of them that are technically savvy, but most of them are ignorant...
I would imagine they are using SSL to encrypt it between the user and the agent. Seems about as secure as online banking assuming neither machine...
LOL @ that guy going through all those steps. The best solution is to nuke the hard drive and reinstall fresh (after backing up of course). This...
No one. You can't trust hardware like that unless it is fully open and can be analyzed.
That's easily deterred by having the developer sign his packages and source code. Once you download it you check to make sure it is signed by the...
I can't say Zimmermann is a con artist. He brought public-key cryptography to the world and spent time in prison for it. Is his new venture...
Well then you have reinvented the One-Time-Pad. A OTP is essentially a stream cipher where the keys are only used once, which sounds an awful lot...
Sounds a lot like the "wheel cipher" system Thomas Jefferson invented in the 18th century. The system Jefferson used had 2^138 complexity but is...
Authentication is up to the user. It's called the Web of Trust. I see no issue with it. You should never sign a key whose identity you haven't...
I love SJVN, he always ruffles the Windows fanbois' feathers.
I use Ubuntu and have disabled UFW all together. I use a router flashed with Tomato and turned the firewall on (which is just iptables since...
No, but there's still no way to tell who's telling the truth. AntiSec is a hacking group, so it's very possible they grabbed the UUID's from...
Almost all of that list is old (1990's) or POC that never made it into the wild. I have heard of about 2 pieces of malware in the wild since I...
Using Windows will make you an even easier target.
Moved here from: US government developing ultimate cyber weapon Congratulations, you have reinvented the one-time-pad, though a weak easily...
Exactly. Any CA can do what Trustwave did and I would bet my house some of them have already given such "privileges" to U.S. spy agencies. The...
I tested this against Ubuntu 12.04 64 bit and the exploit worked (I used metasploit). I tested it against both Firefox and Chromium and it worked...
Don't forget AIDE, which is basically a free clone of Tripwire. Don't forget Mandatory Access Controls. The Linux kernel has several to...
The article is BS. Quantum Computing only invalidates public-key algorithms like RSA and El Gamal. It doesn't have much effect on symmetric...
Agreed. EV certificates are not much better than regular certs. As you said, all it means is that companies pay more money to Verisign or Comodo...
Separate names with a comma.