Security Lessons: Signing Code Insecure updates are the rule, not the exception

May 31, 2013

Kurt looks at the practice of code signing and examines why so few upstream open source projects actually do it.

more »

Stopping Drive-By Attacks Tools to prevent drive-by attacks

May 31, 2013

You won't find a perfect solution to the growing problem of drive-by attacks, but many tools are available to help you keep malicious code off your network.

more »

Linux News

May 20, 2013

News

  • US gov embraces open data
  • Apache Cdorked.A exploit discovered
  • News Bites

New Intel CEO

  • FSF scolds W3C
  • Torvalds releases Kernel 3.9
  • Xen new LF collaboration project

Operating Systems

  • Debian 7.0“wheezy” debuts
  • Windows XP most likely to be victim of attack.
more »

Security Lessons – Ruby Tools Ruby, Rails, and Gems developer tools

Apr 30, 2013

Great tools and resources are available to help you write secure Ruby on Rails code. Kurt examines some tools and offers some tips.

more »

Security Lessons – XML Security It’s time to take XML out back and shoot it

Mar 15, 2013

XML security problems are numerous, but you can take steps to limit your exposure – or you can use a different standard.

more »

Kernel Rootkit Tricks The Spy Within

Mar 11, 2013

Rootkits allow attackers to take complete control of a computer. We describe the tricks intruders use to gain access to the Linux kernel and provide guidelines on hardening the kernel against such attacks.

more »

Command Line – Bastille Linux Learning the basics of architectural security

Feb 22, 2013

Security applications like antivirus protectors respond to events, rather than preventing them from happening, but the best security in Linux is architectural – that is, in its configuration.

more »

Grsecurity Airtight system security with Grsecurity

Feb 22, 2013

Security-conscious people dig a deep moat with crocodiles around their homes, hide their furniture in back rooms, and only let visitors into the bathroom if they know the secret password. Grsecurity follows a similarly extreme principle.

more »
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News