Link: Spotlight: Privacy Advocates Furious As Apple Feature Siphons Off Location Data of Yosemite And iOS 8 Users

The privacy world is peeved at Apple again. It’s emerged that anyone who uses the Spotlight feature in either Mac OS X Yosemite or iOS 8 will have their location and search data passed to Apple servers. The same data will also be sent to Microsoft …..

Full article here:
Spotlight: Privacy Advocates Furious As Apple Feature Siphons Off Location Data of Yosemite And iOS 8 Users (Forbes)
Related:
Apple’s Mac computers can automatically collect your location information (Washington Post)
How to Stop Apple From Snooping on Your OS X Yosemite Searches (Wired)
fix macosx

Link: How to Setup Monitorix – Network and System Monitoring Tool for Linux

Monitorix is an open source and lightweight system monitoring tool designed to monitor network and system resources in linux/UNIX operating system. Monitorix can collects network and system performce and also resources and then display the informations into graphs. it will help system adn network administrator to detect abnormal activities and detecting bottlenecks. This post will show to setup Monitorix on linux centOS 6.5.

Full article here:
How to Setup Monitorix – Network and System Monitoring Tool for Linux (eHow Stuff)

Link: How To Recover A CryptoLocker Infected Hard Drive

CryptoLocker is a ransomware which is just simple and devastating. Up until now, computers effected by CryptoLocker were unusable unless you paid the demanded monetary payment.

…..

Up until now, there was no way to recover the data encrypted by CryptoLocker.

Thanks to the researchers at Fox-IT and FireEye, though, who managed to recover the private encryption keys and Kyrus Technologies for building the actual decryption engine. Combining the efforts, these security firms launched a website which can be used by the victims of CryptoLocker to decrypt their encrypted files free of charge.

Full article here:
How To Recover A CryptoLocker Infected Hard Drive (Make Tech Easier)

Link: Configure “No Password SSH Keys Authentication” with PuTTY on Linux Servers

SSH (Secure SHELL) is one of the most used network protocol to connect and login to remote Linux servers, due to its increased security provided by its cryptographic secure channel established for data flow over insecure networks and its Public Key Authentication.

While using passwords to login to remote servers can provide a less secure to system security, because a password can be brute-force cracked, SSH Public Key Authentication provides the best secure method to perform distance logins, because it’s almost impossible to decipher the key and the private key guarantees that the sender it’s always who it claims to be.

This article will show you how you can generate and use SSH Keys from Windows based platforms using Putty client to automatically perform remote logins on Linux servers without the need to enter passwords.

Full article here:
Configure “No Password SSH Keys Authentication” with PuTTY on Linux Servers (Tecmint)

Link: How to Create Advanced Firewall Rules Using Windows Firewall

Firewall is an important and necessary tool to protect us from the unsecure Internet. Most of the modern OSes come with a built-in firewall, but the problem is that few people know of its existence and only a few know how to configure it.

Windows is no different. By default, it comes with a decent built-in firewall which is capable of controlling all the incoming and outgoing traffic. This built-in Windows firewall is a bit clunky with a not-so-friendly user interface and complex rules, though it does gives you plenty of control on overall rules like blocking, restricting, whitelisting, etc. In this article, we are going to show you how to create advanced firewall rules in Windows firewall to block an application from accessing the Internet.

Full article here:
How to Create Advanced Firewall Rules Using Windows Firewall (Make Tech Easier)

Link: A Pocket Guide for Linux ssh Command with Examples

If you have been in the IT world for quite some time you probably have heard about SSH, how great a tool it is and all its cool security features. In this tutorial you will learn how to use SSH in a few minutes and login to your remote computers seamlessly and securely.

If you have no clue what SSH is you can visit Wikipedia before proceeding.

Full article here:
A Pocket Guide for Linux ssh Command with Examples (LinOxide)

Link: CryptoLocker Encryption Cracked. How To Get Your Files Back.

Over the past few months, one of the most dangerous viruses affecting computers has been Cryptolocker.  Once infected, the virus encrypts all of the document files on your PC, and then demands payment (usually by Bitcoin) in order to divulge the necessary decryption key.  While it’s possible to remove the virus with standard antivirus software, and thus stop the infection spreading any further, the encrypted files remained encrypted.

Until now.

Full article here:
CryptoLocker Encryption Cracked. How To Get Your Files Back. (Gizmo’s Freeware)

Link: How to Create Self-Signed SSL Certificates and Keys for Apache on RHEL/CentOS 7.0

SSL (Secure Sockets Layer) is a cryptographic protocol that allows secure data flow between a server and its clients using symmetric/asymmetric keys by using a digital certificate signed by a Certificate Authority (CA).

…..

This tutorial provides an approach on how to set up Secure Sockets Layer (SSL) communication cryptographic protocol on Apache Web Server installed in Red Hat Enterprise Linux/CentOS 7.0, and generate self-signed Certificates and Keys with the help of a bash script which greatly simplifies the entire process.

Full article here:
How to Create Self-Signed SSL Certificates and Keys for Apache on RHEL/CentOS 7.0 (Tecmint)

Link: How to Find if a Windows Process Is Virus or Legitimate

In case you don’t know, Windows runs a lot of processes in the background, without you knowing. To verify that, simply launch the Windows Task Manager (by right clicking on the taskbar and select “Task Manager” from the list or by pressing “Ctrl + Alt + Del” and selecting Task Manager). Once you are in the Task Manager, navigate to Details tab and you will see a whole bunch of processes which are related to a whole bunch of programs (some of which autostart by itself) running in your Windows machine.

Of course, most of the processes’ names don’t make any sense because of their cryptic naming conventions (igfxpers.exe, etc) and there is no telling if that specific process or processes are legitimate or a virus running in the background to sabotage your PC. That said, you don’t have to be a Windows expert to verify if a running Windows process is legitimate or a virus. All you have to do is to use a free software which can give you all the details you will need.

Full article here:
How to Find if a Windows Process Is Virus or Legitimate (Make Tech Easier)