[SOLVED] Any guy able to exploit a Wordpress, Joomla, Drupal from a Slackware Server can get easily root access. How do you comment, Mr. Volkerding?
SlackwareThis Forum is for the discussion of Slackware Linux.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Let's see [snip]
-- kjh( I wonder why do they use that term 'enjoy' wrt software ? Does anyone enjoy using their other tools, like say their hammer ? )
[snip]
It's providing fitness for free
And improves blood count results if used for "recreation" (a.k.a. "demolition")
software isn't
I guess we could call it sufferware?
and hammerware - the fitness receiving part?
Encrypting an entire disk not dedicated to sensitive data is a waste of energy and introduces needless complexity and additional access time. Better off encrypting a specific folder/partition.
Here is the catch: operating systems and applications can be very leaky.
You might encrypt /home only, because you think the only sensitive information (pr0n?) is stored there, but the data can be copied over to /tmp or /var or the swap without explicit permission by your programs. Even if the system then deletes the data from those unsafe locations, it can be still retriveable unsing forensic tools.
I'd play safer and encrypt everything but the components required for booting when possible. I have had to use systems in which pseudo-full-disk-encryption was not an option and I had to run a cleaning program periodically on the drive. *That* was annoying and complex and complicated, unlike using dm-crypt for encrypting everything.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.