Nginx Security Vulnerabilities – Multiple Flaws Fixed

============================================================ Product: Nginx URL: http://nginx.org CVE Number: CVE-2018-16843, CVE-2018-16844, CVE-2018-16845 Impact: Low / Medium Date: 2018-11-10 ============================================================ Product Description nginx [engine x] is an HTTP and reverse proxy server, a mail proxy server, and a generic TCP/UDP proxy server, originally written by Igor Sysoev. For a long time, it has been running on many heavily … Continue reading Nginx Security Vulnerabilities – Multiple Flaws Fixed

Change Post Full Content to Excerpt for WordPress TwentyFifteen

The TwentyFifteen WordPress theme displays the full content of a post in post indexes. The full content of the post will still display even if you’ve entered a excerpt for that post. But how can you change it to display excerpts only for blog posts? Login to your WordPress administration panel, and go to Appearance … Continue reading Change Post Full Content to Excerpt for WordPress TwentyFifteen

Big Blue puts on a Red Hat

On Sunday IBM announced that it would buy Red Hat, the largest vendor of open-source software, for $34bn. This is the biggest-ever deal between software companies and shows how much pressure IBM is under to adapt to a changing IT sector, after falling behind in cloud computing. Red Hat’s technology is supposed to create an über-cloud, allowing computing workloads to run anywhere. But firms may still shy away from IBM’s new platform.

F-Secure Linux Security – FSC-2018-3 (Security Advisory)

============================================================ Product: F-Secure Linux Security OS: Linux URL: https://www.f-secure.com Type: Race Condition Vulnerable Version: All Prior Versions Fixed Version: 11.10 CVE Number: N/A Impact: Low / Medium Date: 2018-10-16 ============================================================ Product Description F-Secure Linux Security provides core security capabilities for Linux environments: multi-engine anti-malware and built-in firewall management, in addition to vital Integrity Checking for … Continue reading F-Secure Linux Security – FSC-2018-3 (Security Advisory)

End the Cruel Shark Fin Trade in Canada

Sharks have been swimming in our oceans for 420 million years – 200 million years before dinosaurs walked the earth. Today many species are in trouble. As apex predators, sharks play an important role in the ecosystem by maintaining the species below them in the food chain and serving as an indicator for ocean health. … Continue reading End the Cruel Shark Fin Trade in Canada