Archive | Ocak, 2020

Manjaro 18.1.5 güncellemesi

Arch Linux tabanlı Manjaro Linux’un 18.1.5 sürümünün yeni bir güncellemesi, Philip Müller tarafından duyuruldu. Yeni bir test güncellemesini duyurmaktan mutluluk duyduğunu söyleyen Müller; bunun bir test sürümü olduğunun unutulmaması ve yalnızca test etmek amacıyla kullanılması gerektiğini hatırlattı ve test eden kullanıcıların tespit ettikleri hataları rapor etmelerini rica etti. mhwd 440 ve 435 sürücü serisi için ilk Nvidia-Prime desteğinin sağlandığını söyleyen Müller; bazı KDE-git paketleri güncellendiğini ifade etti. Sorun bildirildiği için linux419-ekstramodüllerin yeniden inşa edildiğini belirten Müller; Pamac 9.3 serisindeki bazı sorunların düzelttildiğini söyledi. Biraz Haskell güncellemesi ve yeniden oluşturmalar eklenen sürümün oluşturulmasına yönelik giriş ve geri bildirimler için kullanıcılara teşekkür ettiklerini vurgulayan Müller; sistemi, Arch’ın varsayılan sıkıştırması zstd 1’e güncellediklerini söyledi. Manjaro Linux’un 18.1.5 güncellemesi hakkında ayrıntılı bilgi edinmek için sürüm duyurusunu inceleyebilirsiniz.

Continue Reading →

Manjaro 18.1.5 güncellemesini edinmek için aşağıdaki linklerden yararlanabilirsiniz.

0

GNOME Shell ve GNOME Mutter’in 3.35.3 sürümleri duyuruldu

GNOME Shell ve GNOME Mutter’in de 3.35.3 sürümleri, Florian Müllner tarafından duyuruldu. GNOME masaüstü ortamında kullanılmakta olan grafik arayüz bileşeni olan GNOME Shell için NVidia sürücüleri için ayrı GPU desteği eklendiği belirtilirken, mod değişiklikleri üzerinde pad OSD eylemlerinin dinamik olarak güncellendiği ifade ediliyor. GNOME Mutter için ise; paralel olarak kırpma dikdörtgenlerinin yüklendiği ve API temizliği yapıldığı söyleniyor. Ayrıca çeşitli hata düzeltmeleri ve temizlemeler yapılmış. GNOME Shell ve GNOME Mutter’in 3.35.3 sürümleri ayrıntılı bilgi edinmek için GNOME Shell ve GNOME Mutter’in sürüm duyuruları incelenebilir.

Continue Reading →

GNOME Shell ve GNOME Mutter 3.34.3 edinmek için aşağıdaki linklerden yararlanabilirsiniz.

0

How to secure your internet activity with Linux system and VPN

Hackers can access, steal and sell your online activity data as well as manipulate it if you don’t use the right system and tools. The level of protection you want will largely influence which tools and systems to use. With a Linux system and VPN, it becomes possible to hide your browsing tracks, personal information, and various other online activities. When you have the right protection in place, not even the government can access your activity. Keep reading to learn how businesses and individuals alike can use a Linux system and VPN for ongoing protection of their online data. We will also explore why this is important and why you should care about your online data. Hackers steal data for a number of reasons. Sometimes, it’s’ for their own purposes. Other times, they sell it or give it to other entities. These entities may or may not have known about the data collection processes the hackers use to gather the data.

Continue Reading →

What Is a VPN?

VPN stands for virtual private network, which means it provides encryption, making it difficult for the bad guys to steal your data when visiting their sites. It also acts as an added layer of protection against the government from tracking your online activity.

In some areas, a VPN even grants users access to certain content that is not normally available in their geographical areas. Such forms of content often include video, international gaming, certain servers, etc.

The VPN works to protect your online activity by making it appear as if you are logged in from a different location. As soon as you connect to the VPN, you can set your location to anywhere in the world.

Additionally, with a Linux system, you can improve the safety and protection of your data thanks to advanced security measures. Fixes for Linux program exploits made by hackers are generally developed and released well before other operating systems develop and release fixes for their equivalent programs.

How Does a Linux System Make Online Activity More Secure?

Getting fixes to exploits is of the utmost importance in both personal and business settings, particularly those sitting on large amounts of data.

Hackers, crackers, and phreakers steal people’s online data all the time for multiple reasons. Some do it to fight a cause, some steal it unintentionally, some do it for fun, a few do it for commercial espionage or sabotage, and lastly, it’s not uncommon for disgruntled employees to steal data for whistle blowing purposes.

A Linux system helps avoid several types of attacks:

  • Reading data
  • Denial of service
  • Altering/manipulating data
  • Access to system

Tips for Increasing Data Protection With a Linux System

To increase data protection through the use of a Linux system, you must first pinpoint what you mean by “secure.” To do this, you must assess what you intend to do with the system and just how secure you need the data to be. In most cases, Linux systems need security, at a minimum, in the following areas:

  • Authorization: Do not allow ANYONE access to the system unless they NEED access
  • Verification: Make sure users have to go through a 2-step authentication process to verify their identity each time logging into the system
  • Integrity: All personal information must be protected and NEVER compromised
  • Non-repudiation: Must have proof of receipt of data; official receipt showing how you received the data and from whom
  • Privacy/confidentiality: You must abide by any privacy and confidentiality regulations such as the ISO 7984-2 International Standards Organization Security Standard
  • Availability: System must be able to perform its required function at all times during normal operating hours while maintaining security around the clock.

Choose a Native App

When installing a VPN on a Linux system, you will have two options: Open-source or native app. With a native app, you will get access to more features and less required configuration.

Because of this, it is highly suggested that any VPN you use at least comes in the form of a native client for Linux.

In addition to the dedicated app, users of a VPN that comes in the form of a native client enjoy sophisticated security, ultra-fast speeds, and the ability to run on a command-line interface. Additionally, the server list is always kept up to date, making it simple to download and switch between UDP to TCP over the Open VPN protocol.

Run Through Services and Customize Each of Them

When using Linux as a VPN, you will have several types of facilities to choose from, including mail and WWW. Linux handles some of these services through a system of ports.

Take for example Port 21, which controls FTP. You can check out service names in the /etc/services file for a map of port numbers.

It’s ideal to have most of your services running through a configuration file /etc/inetd.conf. You’ll also want to take a lot of time when running through this type of file as you will have the ability to customize how each of the available services is running and protected.

Keep Services in inetd.conf Turned OFF

Check the services in inetd.conf, and make sure they are not set to turn on by default. To achieve maximum security, you must turn them off. You can type the command netstat -vat to see which services are currently running on your Linux or alternatively, you can use ss command. For any services that you are unfamiliar with, make sure to look them up in /etc/inetd.conf.

Final Thoughts

There are numerous VPNs to choose from. The surfshark.com VPN is especially ideal for those who want to unblock lots of region-locked content from sources such as Netflix, Amazon Prime Video and Hulu.

Users of this VPN are also huge fans of their ability to connect to the VPN through an unlimited number of devices. This is an example of a VPN that has the features you should look for when researching for ways to use a Linux system to secure internet activity.

0

Anonymized Data Is Not Anonymous

We have all more or less accepted that we are living in some kind of dime-store George Orwell novel where our every movement is tracked and recorded in some way. Everything we do today, especially if there’s any kind of gadget or electronics involved, generates data that is of interest to someone. That data is constantly being gathered and stored, used by someone to build up a picture of the world around us. The average person today is much more aware of the importance of their own data security. We all understand that the wrong data in the wrong hands can be used to wreak havoc on both individuals and society as a whole. Now that there is a much greater general awareness of the importance of data privacy, it is much more difficult for malicious actors to unscrupulously gather sensitive data from us, as most people know not to hand it over.

Continue Reading →

Data Protection Laws

In most jurisdictions, there are laws and regulations in place that govern how personal data can be collected, stored, shared, and accessed.

While these laws are severely lacking in a number of areas, the trend in recent years has been to increasingly protect individuals from corporate negligence and excess, which has been welcomed by most consumers.

Probably the best-known data protection law is the famed GDPR, or the General Data Protection Regulation which came into force in 2018. Though in theory it has power only within the EU, in practice the law applies to every company that deals with EU citizens.

Its strict privacy requirements have made many businesses reconsider how they handle data, threatening misbehavers with fines that can climb into billions of euros (up to 4% of the company’s annual turnover).

Unlike the EU, the US has no single regulation on the federal level to protect the data of its citizens. Acknowledging that, some states have released their own privacy laws.

Probably the most extensive of them to date is the CCPA, or the California Consumer Privacy Act.

The act will come into power beginning with 2020 and grant the citizens of California many of the same rights that EU citizens have come to enjoy.

It will allow Californians to know what data is collected about them, where it is used, say no to selling their data, and request to delete it.

Anonymized Data

One common theme that has emerged in the regulations from different jurisdictions is the notion of anonymized data. As the name implies, this is data that cannot be tied to a specific individual.

A set of anonymized data might be presented as belonging to a particular individual, but the identity of the subject is not revealed in the data.

Data anonymization presents an attractive common ground between the rights of consumers and those that want to make use of their personal data.

After all, information about who we are and what we do has long been the driving force behind many of today’s largest companies, including Google, Facebook, and Amazon.

But private corporations are not the only beneficiaries of our data. Removing any personally identifiable information from a dataset and anonymizing it, researchers are able to work with large and detailed datasets that contain a wealth of information without having to compromise any individual’s privacy.

By anonymizing data, we are also able to encourage people to share data that they would otherwise hold on to. Businesses and governments can access and trade vast amounts of data without infringing anyone’s privacy, thanks to anonymization.

Meanwhile, users don’t have to worry about data they generate being recorded and revealing information about them personally.

Data Anonymization Techniques

There are many ways to anonymize data, varying in cost and difficulty.

Perhaps the easiest technique is simply to remove some of the user’s direct identifiers. This is basically your main personal information. For instance, an insurance company could delete a customer’s name, date of birth, and call the data as good as anonymized.

Another method is to generalize the data of multiple users to reduce their precision. For instance, you could remove the last digits of a postcode or present a person’s age in a range rather than the exact number.

It is one of the methods Google uses to achieve k-anonymity – this elaborate term simply means that a certain number of people (defined by the letter k) should share the same property, such as ZIP code.

One more way is to include noise into the dataset. By noise I mean swapping around the information about certain properties between individuals or groups.

For example, this method could switch your car ownership details with another person. Your profile would change, but the whole dataset would remain intact for statistical analysis.

Finally, you can further protect the anonymized data you need to share by sampling it – that is, releasing the dataset in small batches. In theory, sampling helps to reduce the risk of re-identification.

Even if the data is enough to identify you as an individual, statistically there should be at least several other people with the same characteristics as you. Without having the whole dataset, there is no way to tell which person it really is.

Other data anonymization techniques exist, but these are some of the main ones.

Deanonymization

So, anonymization makes everyone a winner, right? Well, not quite.

Anyone who has worked extensively with data can testify as to just how little information is needed to identify a specific individual out of a database of many thousands.

One of the consequences of the massive volumes of data that now exists on all of us is that different data sources can be cross-referenced to identify common elements.

In some cases, this cross-referencing can instantly deanonymize entire data sets, depending on how exactly they have been anonymized.

Researchers were able to recover surnames of US males from a database of genetic information by simply making use of publicly available internet resources.

A publicly available dataset of London’s bike-sharing service could be used not only to track trips but also who actually made them.

Anonymized Netflix movie ratings were mapped to individuals by cross-referencing them with IMDB data, thus revealing some very private facts about users. These are only a few of the many similar examples.

Since the introduction of the GDPR, a number of businesses have been looking for ways of continuing to handle large volumes of customer data without falling afoul of the new regulations.

Many organizations have come to view anonymized datasets as a means of potentially circumventing the regulations. After all, if data isn’t tied to specific individuals, it can’t infringe on their privacy.

No Such Thing as Anonymous

According to new research conducted by researchers from Imperial College London, along with their counterparts at Belgium’s Université Catholique de Louvain, it is incredibly hard to properly deanonymize data.

In order for data to be completely anonymous, it needs to be presented in isolation. You can use VPN or change your IP address (more information about proxy servers you can find on Proxyway), etc.

If enough anonymized data is given about an individual, all it takes is a simple cross-reference with other databases to ascertain who the data concerns.

Using their own prediction model, the researchers made a startling discovery: it would take only 15 pieces of demographic information to re-identify 99.98% of Americans.

What is more, only four base attributes (ZIP code, date of birth, gender, and number of children) would be needed to confidently identify 79.4% of the entire state of Massachusetts. According to the study, releasing data in small samples is not enough to protect an individual from detection.

Bearing in mind that researchers can deanonymize the records of an entire state, data brokers like Experian are selling anonymized data sets that contain hundreds of data points for each individual.

According to the researchers’ work, this data is anonymized in name only and anyone with the capacity to handle large datasets also has the resources to easily deanonymize them.

It doesn’t matter what methods are used to anonymize data. Even the more advanced techniques like k-anonymity might not be sufficient – not to mention that they are expensive.

In most cases, all that happens is that only immediately identifiable data like names and addresses are removed. This is far from enough.

The researchers’ findings urge us not to fall into a false sense of security. They also challenge the methods companies use to anonymize data in light of the strict regulatory requirements set forth by the GDPR and the forthcoming CCPA.

Wrap-Up

The long battle to get the average internet user to care about their data and privacy has been a tiring one. Anyone who has worked in cybersecurity over the last couple of decades can testify as to how much things have improved, but there is still a long way to go.

The notion that people’s data can be anonymized and rendered harmless is both incorrect and dangerous. It is important that people properly understand the implications of handing their data over. Don’t give up your data under the false impression that it can’t be tied to you.

0

ImageMagick 7.0.9-14 duyuruldu

Resim oluşturmak, düzenlemek veya bitmap resimleri dönüştürmek için kullanılan bir yazılım seti olan ImageMagick‘in 7.0.9-14 sürümü duyuruldu. DPX, EXR, GIF, JPEG, JPEG-2000, PDF, PhotoCD, PNG, WebP, Postscript, SVG ve TIFF dahil 200’ün üzerinde resim biçiminde okuma, dönüştürme ve yazma becerisine sahip olan yazılım; resimleri dönüştürmek, döndürmek, ters çevirmek, ölçeklendirmek, eğmek veya boyutlandırmak; resim renklerini düzenlemek; çeşitli özel efektler uygulamak; metin, çizgi, çokgen, çember ve eğriler eklemek için kullanılabilir. Son derece işlevsel özellikler barındıran yazılım, özgür bir yazılım olarak Apache 2.0 lisansı altında dağıtılıyor. Bir grup GIF animasyon dizisi oluşturma olanağı sağlayan yazılımda, tüm değişiklikler kabuk komutlarıyla yapılabildiği gibi, X11 grafik arayüzle de gerçekleştirilebilir. ImageMagick 7.0.9-14 hakkında bilgi edinmek için sürüm sayfası incelenebilir.

Continue Reading →

ImageMagick 7.0.9-14 edinmek için aşağıdaki linklerden yararlanabilirsiniz.

0

GNOME Shell ve GNOME Mutter’in 3.34.3 sürümleri duyuruldu

GNOME Shell ve GNOME Mutter’in de 3.34.3 sürümleri duyuruldu. GNOME masaüstü ortamında kullanılmakta olan grafik arayüz bileşeni olan GNOME Shell’in modern grafik donanımın özelliklerinden yararlandığını ve kullanımı kolay bir deneyim sunduğu söyleniyor. GNOME Shell için şifresiz olduğunda klavye ile onaylamanın düzeltildiği, çeşitli hata düzeltmeleri dışında temizlik yapıldığı söyleniyor. GNOME Mutter ise; HiDPI’da pencere kaydının düzeltilmesi, XWayland’ı başlatma desteği, çeşitli düzeltmelerle geliyor. Konu hakkında ayrıntılı bilgi edinmek için GNOME Shell ve GNOME Mutter’in GNOME Shell ve GNOME Mutter haber sayfaları incelenebilir.

Continue Reading →

GNOME Shell ve GNOME Mutter 3.34.3 edinmek için aşağıdaki linklerden yararlanabilirsiniz.

0