Blog Posts Tagged with "Linux"


Protecting Linux Against Overflow Exploits

September 23, 2010 Added by:Jamie Adams

Most overflows are addressed during the development process because testing will often uncover erratic program behavior, memory access errors, incorrect results, and unexpected program terminations. Those which aren't identified and make it into production are often abused by attackers...

Comments  (2)


SAMBA Vulnerability Could Be Dangerous

September 22, 2010 Added by:Brent Huston

If you are not already looking at the newest SAMBA issue, you should be paying attention. It is a stack-based buffer overflow, exploitable remotely without credentials. The MetaSploit folks are already hard at work on an exploit and some versions are rumored to be floating about the underground...

Comments  (0)


PCI DSS from a Linux SysAdmin's Perspective

September 08, 2010 Added by:Jamie Adams

A cursory glance at the PCI DSS might lead one to believe that the majority of work required to comply with the standard belongs to network, database, application administrators and software developers. There is always a great deal of work required anytime an application is deployed...

Comments  (3)


User Review of Puppy Linux 5.0

July 19, 2010 Added by:Brent Huston

I have really come to love Puppy Linux over the last several years. I use it as a LiveCD/USB platform for secure browsing, a Linux OS for old hardware that I donate to a variety of folks and causes, and as a platform for using HoneyPoint as a scattersensor...

Comments  (1)


AV software on Linux?

June 04, 2010 Added by:Rod MacPherson

I recently got involved in a discussion around the value of AV software on the Linux platform in an Ubuntu user group on Linked-in.  Along-side much discussion over what people use and why, there was a fair bit of (in my opinion, misdirected) opinion that AV is not needed on Linux due to how hard it is to write a "virus" for that platform.

Comments  (6)

Page « < 1 - 2 - 3 - 4 > »