Access Control Lists Working with Access Control ListsMay 31, 2008
The ancient Linux permission system is often insufficient for complex production environments. Access Control Lists offer a flexible alternative.more »
SE Linux Mandatory Access Control (MAC) with SELinuxMay 31, 2008
SELinux provides a safer system through the powerful concept of mandatory access controls.more »
Sshutout and Fail2ban Fighting dictionary attacks with Sshutout and Fail2banMay 31, 2008
Services that require a username and password for login are potential targets for dictionary attacks. Sshutout and Fail2ban introduce time penalties for invalid attempts.more »
The GnuTLS project has published two bugfix releases to close several vulnerabilities and resolve an error capable of interrupting connections.more »
The security and quality of Open Source software just keeps on improving, as code analysis by Coverity reveals.more »
Red Hat's David Airlie reports in his blog that a simple hack allowed him to develop an X server without root privileges in the course of just one afternoon.more »
Security researchers iDefense have disclosed three vulnerabilities in the Rdesktop Remote Client.more »
The Ubuntu security team has released an update to close a vulnerability in the Vorbis Tools for editing music files in Ogg-Vorbis format.more »
New release marks the arrival of AMD’s unified driver strategy.
A new study by IDC charts big changes in the big hardware market.
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?