opensource.com: I'm setting up a new computer. I get through the registration screens, install my software, change my wallpaper, and everything's working fine. I'm left, though, with a lingering, uneasy feeling: I don't know if this machine is secure.
blog.eracc.com: It is almost that time again. The ritual of installing Microsoft patches released on the second Tuesday of each month to fix security problems. It is an ironic coincidence that I have received update notices from Mandriva for software installed on my Linux PC systems as well this weekend.
itworld.com (IDG): A number of Linux distributors have issued patches for fixing a widely used program that fetches Web pages, called Wget, so it can not be misused by attackers.
esecurityplanet.com: There is a widely held belief that Linux is a completely secure operating system. But to Brad Spengler of the grsecurity project, the belief is far from accurate. And he has the kernel exploits to prove it.
itworld.com: Even in the wild frontiers of today's Internet, good basic Unix system security provides extremely valuable protection against security breaches. In today's column, I'm going to rant about some basic security rules of thumb that every Unix sysadmin ought to consider.
linuxjournal.com: Although my intent is not to start the next GNOME/KDE-level war, it seems there must be a happy medium between total desktop insecurity and total desktop unusability.
jeffhoogland.blogspot: Many Linux Advocates, myself included, assert that our operating system of choice is more than ready for the "general public" or "average user". In recent years it seems the term "user friendliness" has become associated with the exact opposite of what I love about Linux:
toolbox.com/blogs: While there is no excuse for inattention and lack of knowledge, the fact is that there are Linux virus's (viruses, virii?) and there will be more.
toolbox.com/blog: The alarm has rung several times before and each time the snooze button was pressed. This time, just recently, the alarm has rung with yet another compromised download resulting in another Linux trojan back door. The time has come for us to stop hitting that snooze button.
itworld.com: There have been several stories proclaiming that a recent Linux infection proves Windows malware monopoly is over and that Think Linux is free from malware? Think again; it's been hacked. Much as it pains me to disagree with the good people, they're wrong.
blogs.techrepublic.com: Protecting a networked computer is a never-ending challenge — even in Linux. These simple measures will help protect your Linux box.
- Linux infection proves Windows malware monopoly is over
- "Is Linux Secure?" at Southeast LinuxFest
tcs-security-blanket.blogspot: BROKEN LINKS in Linux file systems are not just annoying — they can also be a security risk. In a previous post, I discussed the potential dangers of unowned files and in this post I will talk about those annoying, resource consuming broken links usually considered simple file system “lint”.
computerworlduk.com: Who's got the safest operating system? Apple, Google, Microsoft? According to one security expert, what really matters is who's using the OS.
links.org: Nigori is a protocol for storing secrets in the cloud such that the storage need not be trusted and only a single password is required to access secrets.
linuxinexile.blogspot: Organizations can no longer tolerate the security risks posed by intentional, accidental or indirect misuse of privileges. You will learn how to securely delegate privileges and authorization without disclosing the root password.
eff.org: New research by the Electronic Frontier Foundation (EFF) has found that an overwhelming majority of web browsers have unique signatures -- creating identifiable "fingerprints" that could be used to track you as you surf the Internet.
h-online.com: Oracle's forthcoming version 5.1.47 of MySQL is said to contain several important security patches. The changelog states that the developers have closed three security holes which allow attackers to cause a server crash, obtain unauthorised database access or, in the worst case, inject arbitrary code and execute it on the server.
securecomputing.net: A lack of knowledge and awareness about how to use Linux mail servers could be contributing to the disproportionately large number of Linux machines being exploited to send spam, according to new Symantec Hosted Services research.