Here is a very reputable source discussing the Facebook messenger privacy scanda…

Here is a very reputable source discussing the Facebook messenger privacy scandal... As I've previously stated, it has been blown way out of proportion and is safe to install.


Facebook Messenger has abundance of permissions
blog.malwarebytes.org
This isn't the first time questions have risen about Facebook's long list of permissions. The question is whether this and similar apps really need all these permissions.

Here is how you can test if you are vulnerable from the latest bash bug: Am I…

Here is how you can test if you are vulnerable from the latest bash bug:

Am I vulnerable?
Edit for the time being: You are. No complete public fix has been posted yet, for the new CVE (CVE-2014-7169). The instructions I give below are only sufficient to close off part of the vulnerability.

There is an easy check. Open a terminal and paste the following:

env x='() { :;}; echo vulnerable' bash -c 'echo hello'
It simply sets the environment variable called x to the value '() { :;}; echo vulnerable'. It then invokes bash asking it to echo back the word hello. The value of x that is set is a function definition that should do nothing. However, it is crafted to try to run 'echo vulnerable' at parsing of environment at bash start-up, which just prints vulnerable to standard out.

If you are not vulnerable, then the following will be shown:

bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
hello
If you are vulnerable, then you will see:

vulnerable
hello


Most likely you will be. In that case, a "yum update bash" should fix it. But I have been told that a reboot, after the update, is also be necessary...


What is the CVE-2014-6271 bash vulnerability, and how do I fix it?
askubuntu.com
Recently, there have been news going around regarding "CVE-2014-6721", which is a vulnerability in Bash. How do I know if I am affected by this, how can I fix it, and why should I care? This is de...