Flexible Access Control with Squid Proxy

By Mike Diehl Large enterprises and nuclear laboratories aren’t the only organizations that need an Internet access policy and a means of enforcing it. My household has an Internet access policy, and the technique I’ve used to enforce it is applicable to almost any organization. In our case, I’m not too concerned about outside security threats.

From: LXer

FacebookTwitterGoogle+LinkedInEvernotePocketGoogle Gmail

Panel computer runs Linux or Android on AM335x SoC

AndersDX unveiled a panel computer based on a Sitara AM3354 SoC, with WiFi and BT, and a 5.7-inch, VGA resistive or 4.3-inch, WVGA capacitive touch display. We typically cover UK-based AndersDX (Anders Electronics) in its role as a distributor of products such as CompuLab’s mini-PCs and embedded boards, or TinyGreenPC’s Pi Media Player. In the […]

From: LXer

FacebookTwitterGoogle+LinkedInEvernotePocketGoogle Gmail

Google: Maintaining digital certificate security

By corbet It seems it was about time for another certificate authority horror story;
the Google Online Security Blog duly delivers.
CNNIC responded on the 22nd to explain that they had contracted with
MCS Holdings on the basis that MCS would only issue certificates for
domains that they had registered. However, rather than keep the private key
in a suitable HSM, MCS installed it in a man-in-the-middle proxy. These
devices intercept secure connections by masquerading as the intended
destination and are sometimes used by companies to intercept their
employees’ secure traffic for monitoring or legal reasons. The employees’
computers normally have to be configured to trust a proxy for it to be able
to do this. However, in this case, the presumed proxy was given the full
authority of a public CA, which is a serious breach of the CA
system.

From: LWN

FacebookTwitterGoogle+LinkedInEvernotePocketGoogle Gmail

Installing and using vnStat and vnStati for monitoring network traffic in Ubuntu

Monitoring Network Traffic or Bandwidth Usage is an important task in an organisational structure or even for developers. It is sometimes required to monitor traffic on various systems which share the internet bandwidth. There might be situations where network statistics are required for decision making in the networking areas or use the logged information on the network traffic for analysis tasks.

From: LXer

FacebookTwitterGoogle+LinkedInEvernotePocketGoogle Gmail