Discover LinuxSecurity Features

Apache SpamAssassin Leads A Growing List of Open-Source Projects Taking Steps to Correct Instances of Racism and White Privilege

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Over the past few weeks, a heated debate has arisen on the Apache SpamAssassin users list regarding the replacement of racially charged terms like “whitelist” and “blacklist” used in the Apache Spamassassin Project’s code with more inclusive language. Certain community members have been very supportive of Apache SpamAssassin’s efforts to remove racially insensitive language from the project, while others have loudly voiced their disapproval.

Contribute to LinuxSecurity

Don’t sit on the sidelines of history. Join the Linux Security community
and write real news & articles about Linux that matters the most.

Instructions for Disabling AdBlock Extensions on LinuxSecurity.com

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Welcome to the LinuxSecurity.com instruction page on how to turn off your adblocker. We sincerely appreciate the support you are providing by choosing to disable your adblocker on our website. We depend on ad revenue to continue creating free, quality content for you to enjoy. Below are steps you can take in order to white list LinuxSecurity.com on your browser or device.

Google Chrome
Using AdBlock Plus

  • Click on the AdBlock Plus icon on the top right of your browser
  • A drop-down menu will appear with a check mark followed by Enabled on this site
  • Click the button until the text reads Disabled on this site
  • Refresh the page or click Continue to site to access LinuxSecurity.com

Using Chrome adblock extension

  • Click on the hand icon for adblock extension, on the top right corner of your browser
  • A drop-down menu will appear
  • Click the Don't run on pages on this domain option on the drop down
  • Once clicked a settings popup will appear.
  • Click Exclude
  • Refresh the page or click Continue to site to access LinuxSecurity.com

Firefox

  • Click on the AdBlock Plus icon on the top right of your browser
  • A drop-down menu will appear
  • Click the Disabled on LinuxSecurity.com option on the drop down
  • Refresh the page or click Continue to site to access LinuxSecurity.com
  • Firefox "Private Window" runs its own version of adblock. You will receive an adblock detection screen on Private Window, even if you are not running any adblock plugins. In this case, you will need to open LinuxSecurity.com on your standard Firefox window.

Internet Explorer

  • Click on the AdBlock Plus icon on the bottom right hand side of your browser
  • A drop-down menu will appear
  • Click the Disable on www.linuxsecurity.com option on the drop down
  • Refresh the page or click Continue to site to access LinuxSecurity.com

Devices with Apple IOS9 and above

  • Go to the Settings app on the main screen
  • Click on the Safari button
  • From Menu click Content Blockers
  • You will see your blocker enabled. Slide button to the left to disable.
  • Return to your Safari browser and refresh the page or click Continue to site to access LinuxSecurity.com

Know The Enemy: Upgrade Your Threat Detection Strategy with Honeynets

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Honeynets are an invaluable offensive security tool for learning the tactics and motives of the blackhat community and sharing the information and insights gathered. This article will explore what a Honeynet is, its value, how it works and the risks involved with deploying a Honeynet. It will also examine some great open-source honeynet options your organization may wish to consider. 

New Report: Severe Flaws in Cyberoam’s Firewall and VPN Technology Left At Least 86,000 Networks Vulnerable to Exploit

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new report published by vpnMentor examines two critical vulnerabilities in cybersecurity provider Cyberoam’s firewall and VPN technology, which - both independently and combined - could be exploited by malicious actors to access the company’s email quarantine system without authentication and remotely execute arbitrary commands.

Open-Source AI Projects For Linux

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It seems like artificial intelligence (AI) has made its way into nearly every facet of modern life. Programs like the Amazon Alexa, Apple’s Siri and Microsoft’s Cortana are used by millions of people around the world. By the year 2022, over 50 percent of the online searches performed will be done with AI and the power of the human voice.

Open-Source Security Projects: Choosing a Brandable .com Domain

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

LinuxSecurity would like to thank NameEstate.com for contributing this article.

The importance of an open-source security project name can’t be overstated. A name serves as a first impression. It’s your first chance to tell people who you are and what you do. An impactful name is the best way to convey your value and what you can offer to clients. So, when it comes to open source security projects, finding a name that shows you are capable, trustworthy, and secure can determine your reach and success.

Encryption: An Essential Yet Highly Controversial Component of Digital Security

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you’ve been keeping up with recent security news, you are most likely aware of the heated worldwide debate about encryption that is currently underway. Strong encryption is imperative to securing sensitive data and protecting individuals’ privacy online, yet governments around the world refuse to recognize this, and are continually aiming to break encryption in an effort to increase the power of their law enforcement agencies.