Language Selection

English French German Italian Portuguese Spanish

Securing Slackware

Filed under
Linux
Using the exec-shield Kernel Patch on Slackware 10.1

by Kurt Fitzner

The Holy Grail of most any hacker trying to get access to a system is the remote buffer overflow attack. Well, actually, it's finding a Windows PC not protected by a firewall, but the remote buffer overflow attack is a (somewhat) close second. This article will discus one way to help protect against this type of attack on a Slackware Linux system with the installation of a special system called exec-shield.

This installation will occur in two phases. The first phase is installing the exec-shield kernel patch, the second is replacing some of Slackware's packages with ones that are compiled to work together with exec-shield.

What is a Buffer Overflow Attack?

Before we explain how to protect against a buffer overflow attack, it is useful to examine what exactly this attack is and what the ramifications are for an unprotected system.

The best way to secure against a buffer overflow attack is to run software that isn't vulnerable to such attacks.

In order for a malicious attacker to get your system to do what the attacker wants it to do by using a buffer overflow to rewrite a return address, the attacker has to know the exact address in memory on your system of a useful function.

Full Article.

More in Tux Machines

Canonical Publishes Impressive Roadmap for All of Their Ubuntu Products

Canonical is working on multiple projects at the same time, and it's often difficult to understand their plans, but Director of Product Strategy Engineering Olli Ries has shed some light on how their inner workings are structured and how things are evolving, from the inside out. Read more

Making the Case for Koha: Why Libraries Should Consider an Open Source ILS

When Engard educates people on what open source is, what it means to use open source software, what types of software are available, which companies use it, and who trusts it, they see that their fears are unfounded, she says. To back up her discussions with facts, she maintains bibliographies on open source and open source security. She also has a set of bookmarks on Delicious, and she wrote a book, Practical Open Source Software for Libraries. “[W]hen people come to me and say open source is too risky … I have facts and figures, just what librarians want, to say no, all software has potential risk associated with it. You have to evaluate software side by side, and look at it, and really take the time to compare it. … I know you’re going to pick the open source solution over the proprietary because it is so quickly developed, so quickly fixed, so ahead of the curve as far as technology is concerned.” Read more

Review of Ubuntu Phone – A Work Still Under Progress

However, what one must remember is that the Ubuntu Phone is still a work in progress. The company is issuing updates every month and is relying on its current user base regarding the feedback and ideas. Right now, only three Ubuntu phones are present in the market ranging from $186 to $328 roughly. Ubuntu has been in hibernation mode for the development of this OS for a long time and it looked like they might be consumer ready now, however, after seeing the Ubuntu Phone it looks like they might be far from that scenario right now. Read more

Android M news: Release date delayed, to come out in September or October?

Google reveals that the newest Android operating system initially codenamed as "Android M" will be delaying the release of Android M Developer Preview 3 for selected Nexus devices. The information was shared by the company's employee and moderator Wojtek Kaliciński on the Developer community page in Google+. Read more