Most people set up some type of filter to weed out the bad email from the good. That approach, has its limitations. One company is trying a new, open source-based approach that creates a user-enforced "Do Not Spam" list.
Malicious hackers are increasingly targeting security vulnerabilities in open-source software that runs bulletin boards and online forums, according to Internet monitoring firm Netcraft.
Two critical security considerations that are closely related to one another are ignored all too often: integrity auditing and recovery. This document is an overview of good security integrity auditing and recovery practices using a Linux operating system.
Internet servers, including Web, e-mail, and FTP servers have long been a target of different kinds of attacks aiming to disable them from providing services to their respective users. One particular exploit, which has become almost ubiquitous in the last several years, is the buffer overflow exploit.
Three organizations--Stanford University, Coverity, and Symantec--recently received a Department of Homeland Security grant to assist open source projects in tightening their code with automated code-checking. The question is, will this help be welcome? LinuxPlanet speaks with Coverity's CTO and founder as well as Linus Torvalds to see just how useful Coverity's defect reports have been.
"I believe that Linux needs to get rid of 'root.' Root is not a user; root is a capability to surpass security. As long as that capability exists, there will be ways to hack it."
Linux kernel is susceptible to a local denial of service vulnerability. Linux kernel 2.4 versions on 64-bit x86 architectures prior to 2.4.33-pre1 are affected.
The U.S. government is asking a California court to force Google Inc. to turn over information about usage of the company's search engine for finding pornography on the Internet.
Customers should expect to see enhanced, easier-to-use security tools from leading Linux distributors in the coming months as vendors focus on making the platform tough enough to support even the most critical business applications.