Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
Please recall our recent email regarding the moinmoin  vulnerability  and
the penetration of Debian's wiki . We have reset all password hashes and
sent individual notification to all Debian wiki account holders with
instructions on how to recover (and thereby reset) their passwords . More
technical details about the attack are available .
We have completed our audit of the original server hosting wiki.debian.org and
have concluded that the penetration did not yield escalated privileges for the
attacker(s) beyond the 'wiki' service account.
That said, it is clear that the attacker(s) have captured the email addresses
and corresponding password hashes of all wiki editors. The attacker(s) were
particularly interested in the password hashes belonging to users of Debian,
Intel, Dell, Google, Microsoft, GNU, any .gov and any .edu.
Presumably, the intent was to generate domain / username / password tuples from
the email addresses and (eventually cracked) hashes, and to use these to attack
the home instititions of these users.
If the localpart of your email address (the portion to the left of the @) is
your username at your home institution AND if you tend to use the same password
with multiple services, then we *VERY STRONGLY* recommend changing your
password at your home institution (the portion to the right of the @).
Even if the localpart is not your username at your home institution, we
recommend updating your password as other mechanisms to map your email address
to your username may be available to the attacker(s).
If you have any questions or concerns, please contact the Debian Wiki
Administrator Team  and/or the Debian System Administration Team .
With kind regards,
Paul Wise for the Debian Wiki Administrator Team
Luca Filipozzi for the Debian System Administration Team