TCS logo TimburyDotOrg is owned and operated by Timbury Computer Services. For over ten years, Timbury Computer Services has shown home, small business and corporate clients how to use Linux and Open Source software to maximize efficiency and lower costs.

Updates: The TimburyDotNet web hosting site redesign is complete. Linux-only hosting!More...

BlueCat DNS Edge

Author: James Gray | Files under syndicated

Migration to the cloud, the flexibility of network virtualization and the promise
of IoT involve IT transformations that have placed incredible strain on enterprise
security. more>>


Jetico’s BestCrypt Container Encryption for Linux

Author: James Gray | Files under syndicated

Cyber-attacks are now constant, threats to privacy are increasing, and more rigid
regulations are looming worldwide. To help IT folks relax in the face of these
challenges, Jetico updated its BestCrypt Container Encryption solution to include
Container Guard.


Improving Linux Security with DevSecOps

Author: John S. Tonello | Files under syndicated

Ask people who run IT departments these days what keeps them up at
night, and they’ll probably tell you it’s security—or the lack of
it. With the explosive growth of malicious attacks on everything from hospitals
to Fortune 500s, security—not hardware, software and even staff—is
what currently makes life miserable.


Wibu-Systems CmASIC

Author: James Gray | Files under syndicated

Wibu-Systems describes the new generation of its CmASIC module as “the
answer to the security-by-design needs of modern embedded computing
technology leaders:. CmASIC is a module that Intelligent Device
Manufacturers (IDMs) can directly embed into their boards to provide
out-of-the box security and entitlement management.


CyKick Labs Ltd.’s Telepath

Author: James Gray | Files under syndicated

When a shopper enters a store, the retailer doesn’t know if the person
will simply browse, make purchases, shoplift or hold up the register. The
same goes for visitors to a website. The challenge is to prevent and stop
the bad guys without hindering beneficial customer transactions.


PasswordPing Ltd.’s Exposed Password and Credentials API Service

Author: James Gray | Files under syndicated

The typical online user has an average of 90 active and inactive online
accounts. This exposure to threats, notes software and IT security
specialist PasswordPing Ltd., helps to inform us why billions of credentials
have been exposed in the past five years alone. To assist organizations and
companies to screen their user accounts for known, compromised credentials,
PasswordPing Ltd. more>>


Tor Security for Android and Desktop Linux

Author: Charles Fisher | Files under syndicated


Internet service providers in the United States have just been given the
green light
to sell usage history of their subscribers by S
J Res 34
, more>>


Simple Server Hardening, Part II

Author: Kyle Rankin | Files under syndicated

In my last
, I talked about the classic, complicated approach to
server hardening you typically will find in many hardening documents and countered it
with some specific, simple hardening steps that are much more effective
and take a only few minutes. more>>


Flat File Encryption with OpenSSL and GPG

Author: Charles Fisher | Files under syndicated

The Pretty Good Privacy (PGP) application, which has long been known as a
primary tool for file encryption, commonly focused on email. It has
management tools for exchanging credentials with peers and creating secure
communication channels over untrusted networks. more>>


smbclient Security for Windows Printing and File Transfer

Author: Charles Fisher | Files under syndicated

Microsoft Windows is usually a presence in most computing environments, and UNIX
administrators likely will be forced to use resources in Windows networks from
time to time. Although many are familiar with the Samba server software, the matching
smbclient utility often escapes notice.