Language Selection

English French German Italian Portuguese Spanish

Security

Linux Kernel Integer Overflow Vulnerability

Filed under
Security

Eugene Teo has reported a vulnerability in the Linux Kernel, which potentially can be exploited by malicious, local users to gain escalated privileges.

Ten people create 80 per cent of spam

Filed under
Security

TEN WELL AIMED silver bullets would take care of 80 per cent of the world's spam, according to the anti-spam organisation Spamhause. According to Security Pro News, Spamhause thinks that there are only ten people that are responsible for most of the spam in the world.

Denial of service attacks outlawed

Filed under
Security

A UK law has been passed that makes it an offence to launch denial of service attacks, which experts had previously called "a legal grey area."

Red Hat's Cox warns on open source security

Filed under
Security

Linux developer and Red Hat veteran Alan Cox urges caution to those who think Linux security is foolproof

Linux: NVIDIA Binary Graphics Driver Exploit

Filed under
Security

A recent security advisory announced today by Rapid7 explains, "the NVIDIA Binary Graphics Driver for Linux is vulnerable to a buffer overflow that allows an attacker to run arbitrary code as root.

Linux Kernel Denial of Service Vulnerabilities

Filed under
Security

Some vulnerabilities have been reported in the Linux 2.6 Kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service).

Hackers claim zero-day flaw in Firefox

Filed under
Moz/FF
Security

The open-source Firefox Web browser is critically flawed in the way it handles JavaScript, two hackers said Saturday afternoon.

Securing Your Server With A Host-based Intrusion Detection System

Filed under
Linux
Security
HowTos

This article shows how to install and run OSSEC HIDS, an Open Source Host-based Intrusion Detection System. It performs log analysis, integrity checking, rootkit detection, time-based alerting and active response. It helps you detect attacks, software misuse, policy violations and other forms of inappropriate activities.

How To Combat Viruses Using Your Postfix Configuration

Filed under
Linux
Security
HowTos

In this guide you will learn how to tweak your Postfix/Amavisd setup to give better virus protection. If you want to achieve business grade virus protection you need to do a few small things so that there is less chance of the latest greatest script kiddie invention getting through. Therefore this tutorial shows how to install and use ClamAV, F-Prot, and McAfee UVScan.

Red Hat Champions Security Vulnerabilities Forum

Filed under
Security

Red Hat today announced its continuing commitment to superior security services with a new initiative, implemented by the National Institute of Standards and Technology (NIST), that enables members of the software industry to officially and publicly comment on vulnerabilities.

Syndicate content

More in Tux Machines

Munich Switching to Windows from Linux Is Proof That Microsoft Is Still an Evil Company

Reports about the city of Munich authorities that are considering the replacement of Linux with Microsoft products mostly comes from one man, the Deputy Mayor of Munich, who is also a long-term self-declared Windows fan. Munich is the poster child for the adoption of a Linux distribution and the replacement of the old Windows OS. It provided a powerful incentive for other cities to do the same, and it's been a thorn in Microsoft's side for a very long time. The adoption of open source software in Munich started back in 2004 and it took the local authorities over 10 years to finish the process. It's a big infrastructure, but in the end they managed to do it. As you can imagine, Microsoft was not happy about it. Even the CEO of Microsoft, Steve Ballmer, tried to stop the switch to Linux, but he was too late to the party. Read more

Dangling the Linux Carrot

Sometimes the direct sell method isn’t the best way to close the deal. How do you think the whole “play hard to get” thing got traction throughout the years? That method is successful in any number of applications. And really, I wasn’t wearing my Linux Advocacy hat that evening…I was just a guy relaxing after a day’s work. Read more

Red Hat Sets New 12-Month High at $61.97 (RHT)

They now have a $70.00 price target on the stock, up previously from $57.00. Three equities research analysts have rated the stock with a hold rating and eighteen have issued a buy rating to the company’s stock. Red Hat has an average rating of “Buy” and an average price target of $63.50. Read more

Systemd 216 Piles On More Features, Aims For New User-Space VT

Lennart Poettering announced the systemd 216 release on Tuesday and among its changes is a more complete systemd-resolved that has nearly complete caching DNS and LLMNR stub resolver, a new systemd terminal library, and a number of new commands. The systemd 216 release also has improvements to various systemd sub-commands, an nss-mymachines NSS module was added, a new networkctl client tool, KDBUS updates against Linux 3.17's memfd, networkd improvements, a new systemd-terminal library for implementing full TTY stream parsing and rendering, a new systemd-journal-upload utility, an LZ4 compressor for journald, a new systemd-escape tool, a new systemd-firstboot component, and much more. Read more