Language Selection

English French German Italian Portuguese Spanish

Security

Blue Security's Do Not Intrude Registry

Filed under
Security

Most people set up some type of filter to weed out the bad email from the good. That approach, has its limitations. One company is trying a new, open source-based approach that creates a user-enforced "Do Not Spam" list.

AMD Hack Points to Widespread Web Forum Flaws, Attacks

Filed under
Security

Malicious hackers are increasingly targeting security vulnerabilities in open-source software that runs bulletin boards and online forums, according to Internet monitoring firm Netcraft.

Linux 101: Best practice for security integrity auditing and recovery

Filed under
Security

Two critical security considerations that are closely related to one another are ignored all too often: integrity auditing and recovery. This document is an overview of good security integrity auditing and recovery practices using a Linux operating system.

Preventing Buffer Overflow Exploits

Filed under
Security

Internet servers, including Web, e-mail, and FTP servers have long been a target of different kinds of attacks aiming to disable them from providing services to their respective users. One particular exploit, which has become almost ubiquitous in the last several years, is the buffer overflow exploit.

How Relevant is the Homeland Security Grant?

Filed under
Security

Three organizations--Stanford University, Coverity, and Symantec--recently received a Department of Homeland Security grant to assist open source projects in tightening their code with automated code-checking. The question is, will this help be welcome? LinuxPlanet speaks with Coverity's CTO and founder as well as Linus Torvalds to see just how useful Coverity's defect reports have been.

Users get to the root of Linux security holes

Filed under
Security

"I believe that Linux needs to get rid of 'root.' Root is not a user; root is a capability to surpass security. As long as that capability exists, there will be ways to hack it."

Linux Kernel SEARCH_BINARY_HANDLER Local Denial of Service Vulnerability

Filed under
Security

Linux kernel is susceptible to a local denial of service vulnerability. Linux kernel 2.4 versions on 64-bit x86 architectures prior to 2.4.33-pre1 are affected.

U.S. government wrestles Google for search records

Filed under
Security

The U.S. government is asking a California court to force Google Inc. to turn over information about usage of the company's search engine for finding pornography on the Internet.

Linux vendors stepping up their focus on security

Filed under
Security

Customers should expect to see enhanced, easier-to-use security tools from leading Linux distributors in the coming months as vendors focus on making the platform tough enough to support even the most critical business applications.

Syndicate content

More in Tux Machines

today's leftovers

F2FS Tools Gain FSCK Support

The F2FS Tools v1.4.0 release introduces fsck.f2fs for fixing corrupted images/partitions for Samsung's Flash-Friendly File-System. There's also now dump.f2fs for retrieving a specific file. Additionally, the f2fs-tools 1.4 update also has bug-fixes for the stat and fibmap utilities. Last but not least is some code refactoring for the Android build. The release was mentioned today on the kernel mailing list by Samsung's Jaegeuk Kim. Read more

xorg-server 1.16.1

xorg-server 1.16.1 is now available. A single fix since Monday's 1.16.0.901, to address an issue when building Xwayland from the tarball. Julien Cristau (2): xwayland: always include drm.xml in tarballs Bump to 1.16.1 git tag: xorg-server-1.16.1 Read more

Geary Email Client Receives Major Overhaul and New Features

Geary, a lightweight email program designed around conversations and built for the GNOME desktop by the Yorba software group, has reached version 0.8 and it comes with a ton of new features. Read more