Language Selection

English French German Italian Portuguese Spanish

Security

Blue Security's Do Not Intrude Registry

Filed under
Security

Most people set up some type of filter to weed out the bad email from the good. That approach, has its limitations. One company is trying a new, open source-based approach that creates a user-enforced "Do Not Spam" list.

AMD Hack Points to Widespread Web Forum Flaws, Attacks

Filed under
Security

Malicious hackers are increasingly targeting security vulnerabilities in open-source software that runs bulletin boards and online forums, according to Internet monitoring firm Netcraft.

Linux 101: Best practice for security integrity auditing and recovery

Filed under
Security

Two critical security considerations that are closely related to one another are ignored all too often: integrity auditing and recovery. This document is an overview of good security integrity auditing and recovery practices using a Linux operating system.

Preventing Buffer Overflow Exploits

Filed under
Security

Internet servers, including Web, e-mail, and FTP servers have long been a target of different kinds of attacks aiming to disable them from providing services to their respective users. One particular exploit, which has become almost ubiquitous in the last several years, is the buffer overflow exploit.

How Relevant is the Homeland Security Grant?

Filed under
Security

Three organizations--Stanford University, Coverity, and Symantec--recently received a Department of Homeland Security grant to assist open source projects in tightening their code with automated code-checking. The question is, will this help be welcome? LinuxPlanet speaks with Coverity's CTO and founder as well as Linus Torvalds to see just how useful Coverity's defect reports have been.

Users get to the root of Linux security holes

Filed under
Security

"I believe that Linux needs to get rid of 'root.' Root is not a user; root is a capability to surpass security. As long as that capability exists, there will be ways to hack it."

Linux Kernel SEARCH_BINARY_HANDLER Local Denial of Service Vulnerability

Filed under
Security

Linux kernel is susceptible to a local denial of service vulnerability. Linux kernel 2.4 versions on 64-bit x86 architectures prior to 2.4.33-pre1 are affected.

U.S. government wrestles Google for search records

Filed under
Security

The U.S. government is asking a California court to force Google Inc. to turn over information about usage of the company's search engine for finding pornography on the Internet.

Linux vendors stepping up their focus on security

Filed under
Security

Customers should expect to see enhanced, easier-to-use security tools from leading Linux distributors in the coming months as vendors focus on making the platform tough enough to support even the most critical business applications.

Syndicate content

More in Tux Machines

Open source software: The question of security

The logic is understandable - how can a software with source code that can easily be viewed, accessed and changed have even a modicum of security? opensource-security-question Open source software is safer than many believe. But with organizations around the globe deploying open source solutions in even some of the most mission-critical and security-sensitive environments, there is clearly something unaccounted for by that logic. According to a November 28 2013 Financial News article, some of the world's largest banks and exchanges, including Deutsche Bank and the New York Stock Exchange, have been active in open source projects and are operating their infrastructure on Linux, Apache and similar systems. Read more

Beer and open source with Untappd

Greg Avola loves beer and coding. He loves beer so much that he made an app, Untappd, where users track their favorite brews. He loves coding so much that he wrote a book about mobile web development. According to him, if it weren't for open source software, his app—and the projects of many other developers—simply wouldn't exist. Read more in my interview with Greg about his open source journey, his favorite beer, and why check-in apps are still relevant. Read more

What is Docker, Really? Founder Solomon Hykes Explains

Docker has quickly become one of the most popular open source projects in cloud computing. With millions of Docker Engine downloads, hundreds of meetup groups in 40 countries and dozens upon dozens of companies announcing Docker integration, it's no wonder the less-than-two-year-old project ranked No. 2 overall behind OpenStack in Linux.com and The New Stack's top open cloud project survey. This meteoric rise is still puzzling, and somewhat problematic, however, for Docker, which is “just trying to keep up” with all of the attention and contributions it's receiving, said founder Solomon Hykes in his keynote at LinuxCon and CloudOpen on Thursday. Most people today who are aware of Docker don't necessarily understand how it works or even why it exists, he said, because they haven't actually used it. “Docker is very popular, it became popular very fast, and we're not really sure why,” Hykes said. “My personal theory … is that it was in the right place at the right time for a trend that's much bigger than Docker, and that is very important for all of us, that has to do with how applications are built.” Read more