Use Proxy చ Twitter Ƀ Tip Us?
 
 

Home

As an addition to the content on this web site we suggest our dear readers to follow us on Twitter now. The account  contains a variety of  assorted content in the field of cyber and information  security.
CMS Change of the ✛ΔO Web Portal
Wednesday, 15 May 2013
After two years in the making the organization released its new offline Web Content Management System named »LXCMS«, which is part of the organization's strategy to improve overall system security, in the wake of increased world-wide threats to cyber and information security.

The new system is set to improve the situation in the area of content delivery, though Joomla! SE was our trusted wCMS software in operation for a long time. However the underlying Joomla! was always developed for the masses to fit their unspecific needs. Additionally Joomla! was always licensed under the GNU/GPL, unlike our new LXCMS which was put under our much simpler TDL 2010. With Joomla! SE we could not have done the same thing for obvious legal reasons. Also Joomla may have been easy to install and upgrade, but was time-consuming to administer in later stages of use. The Joomla core itself was reliable indeed and so was the core of our wCMS Joomla! SE. Further developments though required our systems engineers to acquire a deeper knowledge of the software's code base. Unfortunately development was never optional but explicitly mandatory, since new features and security enhancements had to be ported back to our advantage and our security.
Last updated (Wednesday, 01 April 2015)
Read more...
 
 
Chrome OS and Browser (Part 1)
Wednesday, 01 February 2012
During the last years Google's browser Chrome from the Chromium software project has become increasingly popular. This article focuses on its security design.

The Linux kernel used in (most unixoid operating systems) every single GNU/Linux distribution, including Chrome OS, inherits the traditional UNIX semantics which consists of two basic levels for process execution, file system object permissions and thus access restriction, namely "root" and "non-root". Thereby root processes are allowed to do nearly everything on the system, whereas non-root processes are limited in their executional behavior.
Last updated (Wednesday, 01 February 2012)
Read more...
 
 
Questionable IE 8/9 TÜV Certification
Friday, 01 July 2011
In an effort to get its software more widely accepted, Microsoft entrusted TÜV TRUST IT Ltd. from Austria to determine the security characteristics of the Internet Explorer 8/9.

Company representatives reported about a check of Internet Explorer 8, on Microsoft's official website microsoft.com, which took place from Dec. 2009 to March 2010. It has been pointed out repeatedly that a neutral instance had been given the mandate to run this exhausting investigation. According to these representatives data security, privacy and compliance aspects, based on a broad catalog of requirements, have been taken into account.
Last updated (Friday, 01 July 2011)
Read more...
 
 
 
Folding@Home
© 2015 TRON-DELTA.ORG
Portal v5.1 on ✛ΔO LXCMS v1.1
 

SERVER TIME

  Mar. 30, 2015  ☀  06:12:43 PM

CYBER THREATCON

  CYBER THREATCON: Level A

POLL / VOTE

  Should ✛ΔO engage more   in counter-intelligence?
⚫ Yes, there is demand for such intel operations.
⚫ No, because it may be too dangerous to do that.

SECURITY MODULE

  ᐅ 54.205.167.187
  ᐊ 212.227.245.162

BOOKMARK

Website Press Cmd or Ctrl + D
Page Press Cmd or Ctrl + D

SYNDICATION / RSS

STATISTICS

  Visitors: 495.000+

RELATED ARTICLES

Link Related Content Article No. 1

CAMPAIGNS

  20 Years Linux