Server Security - Page 26
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Databases control most of the business world's valuable information. Pick a vital application--credit-card processing, EDI, financial analysis, just-in-time production--and you'll find a database under it.
iDEFENSE has discovered a flaw in Xpdf, an open-source viewer for Portable Document Format (PDF) files included in most Linux distros. iDEFENSE has confirmed the existence of this vulnerability in version 3.00 of xpdf. It is suspected that previous versions may also be vulnerable. Remote exploitation of the buffer overflow vulnerability in the xpdf PDF viewer could allow attackers to execute arbitrary code as the user viewing a PDF file.
A security researcher has uncovered another set of security flaws in an image component, which could put Linux users at risk of system compromise if they view a maliciously crafted image.
Simply connecting to the Internet -- and doing nothing else -- exposes your PC to non-stop, automated break-in attempts by intruders looking to take control of your machine surreptitiously. . . .
Several major Linux vendors have warned they are vulnerable to four flaws in a widely used IMAP e-mail server from Carnegie Mellon University's Cyrus Electronic Mail Project. The flaws could allow an attacker to take over a server. . . .
This article is intended to outline useful ways of detecting hidden modifications to a Linux kernel. Often known as a rootkit, this stealthy type of malware gets installed in the kernel of an operating system and requires special techniques by Incident handlers and Linux system administrators to be detected. . . .
Linux has gaping security holes caused by systems administrators who either can't or won't keep up with the latest patches, according to a report from British security firm mi2g. . . .
Just one day after the Mozilla Foundation released Firefox 1.0, the group has revealed that prior versions of the open-source browser pose a security threat to users. . . .
Security is all the rage - according to several meanings of "rage:" a hot news topic as well as a cause of hair-tearing anger. . . .
At the end of the day this isn't about which OS is best. And it isn't about security through obscurity. OS makers need to continue to strive for perfection, for multiple layers of protection, to block hackers from gaining the ultimate prize of full control of resources and to include alerting and management tools which make monitoring penetrations easier and which make dealing with them less of a chore. . . .
London-based mi2g Intelligence Unit on Tuesday released a report that says Mac OS X and Berkeley Standard Derivative (BSD) Unix are the "world's safest and most secure 24/7 online computing environments." Linux operating systems offer the worst track record, according to mi2g, with Windows coming in second. . . .
It's easy for administrators and computing professionals to get frustrated with users for all kinds of reasons, but security has to be one of the biggest reasons these days. . . .
Hype alone would have IT executives believe that in coming years service-oriented architectures will be as standard within companies as morning coffee. But network professionals and industry analysts say it won't be that easy, because SOA is something you build, not buy.< . . .
A series of HTML-based exploits allow a malicious HTML programmer to direct a user to a different Web site than the one indicated in the user's browser status line. . . .
Passwords are a pain, but new thinking about passwords and some new tools make it possible to make passwords easier to manage and more effective. . . .
The upgrade features advanced querying capabilities through subqueries, faster and more flexible client-server communication, and new installation and configuration tools. Security also is improved and support has been added for international character sets and geographic data, the company said. . . .
RealNetworks Inc. and KDE eV on Tuesday both released patches for their desktop software, fixing serious security holes that could allow an attacker to take over a user's system. . . .
Linux distributor Suse has warned of one of the most serious security holes to date in version 2.6 of the Linux kernel, which could allow attackers to shut down a system running 2.6-based software. . . .
Linux distributor Novell SuSE released a security advisory with a severity rating of nine out of 10 last week warning of a flaw in Linux kernel 2.6. . . .
Linux vendors have been hit by two fresh security bugs, affecting a widely used graphics decoder and the Gaim instant-messaging client. . . .