A null-pointer dereference in the Linux kernel allows local users to assume root privileges. Brad Spengler, who claims first discovery, announced that he will present a corresponding exploit during the course of the day.more »
Tailbeep is a simple administration tool that sends an audible beep when it finds a specified search string in a log file. Version 0.45 now includes an interface to the Festival speech synthesis framework.more »
The current discussion in the Ubuntu forums is about a possible security hole in GNOME, specifically about GNOME registered users having their passwords appear as cleartext on the keyring. Not a bug, say its defenders, but the security concept behind the GNOME keyring.more »
Security Lessons Kismet, Aircrack-ng, and KarmetasploitNov 01, 2009
How to find, map, crack, and impersonate wireless networks.more »
The Linux-Kongress is traditionally where kernel developers exchange honors and advice about new features and enhancements. This year a number of speakers presented performance improvement data and discussed what aspects of Linux can be drawn out even more.more »
Italian firm Endian has completed work on a Linux-based firewall software product in version 2.3. The Community edition of the Endian Firewall (EFW) includes features that were previously available for paying customers only.more »
Most Linux users think of Trusted Platform Module (TPM) as digital rights management (DRM), i.e. software freedom prevention. However, TPM used in some Intel computer modules may have some useful functions.more »
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.