Language Selection

English French German Italian Portuguese Spanish

How The Linux Foundation and Fedora are Addressing Workstation Security

Filed under
Linux

Are you a systems administrator? Quick, which system in your infrastructure is most vulnerable to hacker attacks? No, it’s not the web server -- though it’s a good guess. No, it’s not the firewall. The answer may surprise you -- it’s your workstation.

Think about it -- unless you’re working for an agency with extremely rigid security policies, you are probably able to connect to servers you administer right from your workstation. Perhaps not all the time -- perhaps you have to establish a VPN connection first in order to be on the “inside.” Once that is done, however, your workstation becomes an extremely interesting target for malicious hackers, since at that time your workstation happens to be the least protected system that sits both on the outside and on the inside of your trusted network.

Did you know that your workstation is currently running software that was written for the sole purpose of letting others execute arbitrary code?

rest here




More in Tux Machines

today's howtos

Phoronix on NVIDIA

  • Compute Shader Support Patches For NVIDIA Fermi On Nouveau
    Samuel Pitoiset has published a set of twelve patches for implementing compute shaders support within the Nouveau NVC0 Gallium3D driver for the GeForce 400/500 "Fermi" graphics processors.
  • NVIDIA Posts Latest PRIME Sync Patches On Road To Better Support
    Alex Goins of NVIDIA has spent the past several months working on PRIME synchronization support to fix tearing when using this NVIDIA-popular multi-GPU method. The latest patches were published this week.
  • The Best Graphics Card Brands For NVIDIA/AMD GPUs As A Linux Consumer?
    One of the most frequent topics I'm emailed about is any brand recommendations among NVIDIA and AMD AIB partners for graphics cards. For Linux users, is there a particular brand preference for graphics cards? The short story is, no, there isn't one particular brand when selecting either a GeForce or Radeon graphics card that a Linux gamer/enthusiast should go with over another AIB partner. Over the past 12 years of running Phoronix, there has been no single AIB partner that superbly stands out compared to the rest when it comes to graphics card AIB partner brands like ASUS, Zotac, HIS, MSI, etc. They all work under Linux, rarely the AIB differences extend beyond the heatsink/cooler and any default clock speed differences, and I haven't seen one that's over-the-top crazy about Linux. I also haven't seen any major partner consistently put the Tux logo or other Linux markings on their product packaging, let alone incorporate any Linux drivers onto their CD/DVD driver media.

Now Zenwalk 8.0 BETA 2

Zenwalk 8.0 release is very close : BETA2 is ready now ! Beta 2 fixes several minor bugs in Zenwalk "z" serie of packages, and also provide all beta2 bugfixes at Slackware level. Read more

Security Leftovers

  • ‘White hat’ then, Red Hat now
    “From white hat to Red Hat,” was the joke a senior executive of Red Hat quipped to Alessandro Perilli, after hearing excerpts from The Manila Times interview with him, to which Perilli answered back with a wink, and a seemingly knowing smile. In the vast world of technology, a “white hat” is an internet slang, which refers to an ethical computer hacker or a computer security expert who hacks with the intention of improving security systems. Perilli is currently the general manager for Cloud Management Strategy for Red Hat, the world’s leading provider of open source solutions. The technology company recently hosted a full-house Red Hat Forum Asia Pacific in Manila, where key senior executives were in attendance.
  • Vulnerability in Font Processing Library Affects Linux, OpenOffice, Firefox
    Four vulnerabilities in the Graphite (or libgraphite) font processing library allow attackers to compromise machines by supplying them with malicious fonts.
  • Air Force to develop cyber-squadrons, Gen. Hyten says at Broadmoor symposium
    The Air Force plans to revolutionize how it handles computer warfare by beefing up its force of cyberspace experts while contracting out easier jobs, like running the service's network.
  • USENIX Enigma 2016 - Usable Security–The Source Awakens