Sometimes it's easier to avoid problems rather than try and elegantly solve them. Linux offers a lot of flexibility; for example, multiple users can use the same system – indeed, even the same screen, keyboard, and mouse. For the long term, placing individual applications within containers that can be restored easily is the way to go. Certainly you can't rely on your software to be free of bugs.
- Firefox 3.0.5 Status Bar Obfuscation/Clickjacking: http://www.milw0rm.com/exploits/7842
- NoScript add-on for Firefox: https://addons.mozilla.org/en-US/firefox/addon/722
- Content Security Policy: http://people.mozilla.org/~bsterne/content-security-policy/
- Xhost manual page: http://www.x.org/archive/X11R6.9.0/doc/html/xhost.1.html
Buy this article as PDF
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.