Language Selection

English French German Italian Portuguese Spanish

Linux companies never miss an opportunity to miss an opportunity

Filed under
Linux
Security

It would be heartening to see James Whitehurst, the head of Red Hat Linux, the biggest commercial Linux outfit, and one that has seen billing go above the billion-dollar mark, deliver a speech at some official forum that underlined the fact that his company's product - and that of other commercial Linux companies - provides a guarantee against the insertion of backdoors.

Read more ►

More in Tux Machines

Linux and FOSS Events (FOSDEM and Beyond)

  • FOSDEM video recordings
  • FOSDEM 2016 and ownCloud, Kolab, KDE and more
    After rocking SCALE, FOSDEM was next and a great event. Killing, too - two days with about 8000 people, it was insane. Lots of positive people again, loads of stuff we handed out so we ran out on Sunday morning - and cool devices at the ownCloud booth.
  • Look over the fence – StartUp Weekend Phnom Penh
    Linux and Free Software plays in South East Asia not that role as in Europe or North America. To change that at least a bit, I came here. The asian culture plays definitely a role and this was often discussed. But it plays lesser the vital role as we think and as the linked article shows, we will not find an easy an solution for the cultural differences. From my perspective it is lesser necessary that we adopt, the most asians I met are willing to accept the differences and can live with them.
  • foss-gbg goes foss-north
    As some of you might know, I run a group that meet and learn new stuff about foss month – foss-gbg. Today it’s official that this summer foss-gbg goes foss-north and it is going to be awesome. So I welcome you all to the wonderful city of Gothenburg to a day filled with talks on a wide variety of topics around free and open source technology. It is going to be awesome!

Mozilla Firefox News

Security Leftovers

  • Rootkit Security: The Next Big Challenge
    Combining this with the Juniper issue, where VPN communication could have been hacked, got me thinking about how firmware can be verified and how to ensure that it’s doing what we think it should be doing and not what someone else wants it to do.
  • What Are Your Container Security Options?
    When virtual machine technology emerged, many organizations' initial approach to security was to apply the same security measures to virtual machines as they did to physical machines. Only later did more specialized software emerge that was specifically designed to meet the security requirements of virtual machines. That process is now beginning to repeat itself, with software specifically designed to meet the security requirements of containers now starting to emerge. Some examples of specialized container security software include Clair and Twistlock.
  • In the shadows of the cyber colossus
    It might come as a surprise that South Africa is not always rated near the bottom in international surveys. According to various reports, the country comes out either third or sixth in the world of top cyber crime hotspots.
  • Mysterious spike in WordPress hacks silently delivers ransomware to visitors
    It's still not clear how, but a disproportionately large number of websites that run on the WordPress content management system are being hacked to deliver crypto ransomware and other malicious software to unwitting end users.

MakuluLinux Xfce is now Live !

MakuluLinux Xfce is now live, please see the Xfce Edition section for more information... Read more