US-CERT Alert (TA13-088A) DNS Amplification Attacks (Revised 22 July 2013)
Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Location: Northeastern Michigan, where Carhartt is a Designer Label
Distribution: Slackware 32- & 64-bit Stable
Posts: 3,541
Original Poster
Rep:
You're welcome.
Something you may want to take a look at is http://www.us-cert.gov/; down at the bottom of the page you can Subscribe to Alerts (there are other lists too, check around at the web site). You won't be bombarded with notices but you will get the ones that are meaningful and worth a read.
Distribution: Linux Mint "Mate" x64 (primary OS), Win 7/8 x64, XP Home/Pro x32.
Posts: 61
Rep:
Many Thanks for posting this thread! Lots of useful info there. Knowledge is empowerment. Though Linux is much more secure than any version of Windows, security still must be of concern to all.
This OS, I frequently use when making purchases/online banking, it's a thin Linux client that can be ran via live CD or USB Flash drive, which is used by the US Air Force for secure computing. Ships with Firefox, Libre Office & Adobe Reader. Although it can be used as a general lightweight portable OS, it's recommended to reboot before prior to doing anything critical.
I initially ran across this OS on the US-CERT site a couple of years back & recommend it to anyone who wants a secure computing experience that's basically boot & run. Plus there's other security related materials on the site, including encryption tools that's free for the public.
Cat
Last edited by catilley1092; 09-19-2013 at 09:31 PM.
Reason: added info
Location: Northeastern Michigan, where Carhartt is a Designer Label
Distribution: Slackware 32- & 64-bit Stable
Posts: 3,541
Original Poster
Rep:
You're welcome.
I've found CERT to be an unbiased source of not only "there's a problem" but also "here's what you can do about it." The recent Java flap being an example (their advice: disable the Java plugin in any browser; good advice). Never really could imagine why executing something on your computer from a web page would be a good idea (like: security hole!) but there you are.
Worth you time to subscribe to the alerts and give 'em a read when they come -- you don't get bombarded, you just get the important ones (well, you do get every Patch Tuesday which, you know, stands to reason, eh? I do not envy Microcrap users in any way, I won't allow it on the property).
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.