3 liens privés
via @jbfavre
via Twitter
@LinuxActus
The Purism Librem 15 is the first high-end laptop in the world that ships without mystery software in the kernel, operating system, or any software applications. Every other consumer-grade laptop you can purchase comes with an operating system that includes suspect, proprietary software, and there’s no way for you to know what that software does. via iMilnb via @falzm
Sslscan c'est beau et magique, mais depuis que les distributions GNU/Linux packagent des versions d'OpenSSL sans support sslv2, une partie des fonctionnalités de sslscan ne fonctionnent plus.
Evidemment, Internet regorge de tutos expliquant comment recompiler et packager la libssl sous diverses distributions Linux de warlordz (j'ai rien contre Kali, au contraire) pour ajouter le support sslv2 et recompiler sslscan. via @jbfavre
Tunneling protocols are increasingly important in modern networking setups. By tying distant networks together, they enable the creation of virtual private networks, access to otherwise-firewalled ports, and more. Tunneling can happen at multiple levels in the networking stack; SSH tunnels are implemented over TCP, while protocols like GRE and IPIP work directly at the IP level. Increasingly, though, there is interest in implementing tunneling inside the UDP protocol. The "foo over UDP" (FOU) patch set from Tom Herbert, which has been pulled into the net-next tree for 3.18, implements UDP-level tunneling in a generic manner. via @lea_linux
Alert Logic met en garde contre une faille de sécurité dans la façon dont Linux gère les droits d'accès. La vulnérabilité Grinch, aussi sérieuse que Shellshock, peut permettre l'octroi « involontaire » d'un accès root au système. via @bortzmeyer
We were recently approached by a customer asking us for support along the lines of “do you have any recommendations as for strict hardening of IPv6 parameters on Linux systems?”. It turned out that the systems in question process quite sensitive data and are located in certain, not too big network segments with very high security requirements.
This is a mini-firewall that completely isolates a target device from the local network. This is for allowing infected machines Internet access, but without endangering the local network. via @linuxfr
Voici le troisième volet de la série 2014 sur la création d'entreprise dans le logiciel libre. Après l'entretien avec Ludovic Dubost au sujet de sa société XWiki, je vous propose de redécouvrir le parcours de Daniel Castronovo qui nous avait déjà parlé de son auto-entreprise Ikux il y a environ 3 ans. via @linuxfr
(souvenirs personnels...) Hervet Renault