Signed, sealed, and delivered

VERIFIABLE

Article from Issue 118/2010
Author(s):

How to avoid malicious code on Linux.

Although it doesn’t happen often, occasionally, an attacker breaks in to a server and manages to modify source code or binary packages that people install on their machines. This happened recently, well actually not that recently, when an attacker broke in and replaced the file Unreal3.​​2.8.1​.tar.gz with one that contains a back door in the DEBUG3_DOLOG_SYSTEM macro.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News