Language Selection

English French German Italian Portuguese Spanish

How The Linux Foundation and Fedora are Addressing Workstation Security

Filed under

Are you a systems administrator? Quick, which system in your infrastructure is most vulnerable to hacker attacks? No, it’s not the web server -- though it’s a good guess. No, it’s not the firewall. The answer may surprise you -- it’s your workstation.

Think about it -- unless you’re working for an agency with extremely rigid security policies, you are probably able to connect to servers you administer right from your workstation. Perhaps not all the time -- perhaps you have to establish a VPN connection first in order to be on the “inside.” Once that is done, however, your workstation becomes an extremely interesting target for malicious hackers, since at that time your workstation happens to be the least protected system that sits both on the outside and on the inside of your trusted network.

Did you know that your workstation is currently running software that was written for the sole purpose of letting others execute arbitrary code?

rest here

More in Tux Machines

Security Leftovers

Android Leftovers

Using open source principles to build better engineering teams

We become better software developers by observing how some of the best software in the world is being written. Open source has changed and will continue to change the way the world builds software, not only by creating high-quality reusable components, but by giving us a model for how to produce better software. Open source gives us complete transparency into that process. Read more

LinuxCon Europe and Embedded Linux Conference Europe