Fedora : Untrusted Application Launcher


The application launcher *.desktop has not been marked as trusted. If you do not know the source of this file, launching it may be unsafe.

Then there is no other options available to you. I found this to be a permission issue if you downloaded the application as root. The app group will need to be changed to a users group with executable rights.

Wi-Fi- IEEE 802.11i-2004-Wireless security

In summary an attacker can clone your existing wifi connection. After which point you will connect to the clone connection without knowing. The attack method will also remove any secure connection ( https – SSL ) . Let see you visit this live and vulnerable website http://www.artsandscraps.org/ . This site is a Joomla based website and you enter your login details at http://www.artsandscraps.org/administrator/ . The attacker can grab those details unecrypted because they have clone your wifi connection. The website owner should force all web traffic to https://www.artsandscraps.org/administrator/ . which is a secure connect and encrypted. Here is the downside. The website owner is allowing secure and unsecure connection which puts you the user at risk.

We will documents some work around and ways you can protect yourself. Keep in mind the attacker do not need your wifi key for this to work.

From the searchers who discovered the vulnerability . krackattacks.com
As a proof-of-concept we executed a key reinstallation attack against an Android smartphone. In this demonstration, the attacker is able to decrypt all data that the victim transmits. For an attacker this is easy to accomplish, because our key reinstallation attack is exceptionally devastating against Linux and Android 6.0 or higher. This is because Android and Linux can be tricked into (re)installing an all-zero encryption key (see below for more info). When attacking other devices, it is harder to decrypt all packets, although a large number of packets can nevertheless be decrypted. In any case, the following demonstration highlights the type of information that an attacker can obtain when performing key reinstallation attacks against protected Wi-Fi networks:

Additional reading arstechnica.com

GNOME : gsettings

gsettings configurations :

GSettings — High-level API for application settings

Set the screen blank timeout settings to 30 min
Timeout for blanking the screen (seconds; 0 = never):

gsettings set org.gnome.desktop.session idle-delay 1800 

Set the Screensaver lock timer
Timeout for locking the screen after blanking (seconds; 0 = instant):

gsettings set org.gnome.desktop.screensaver lock-delay 0

Make the icon smaller

gsettings set org.gnome.nautilus.icon-view default-zoom-level 'small'

Computer , server issues and solutions