Signed, sealed, and delivered

VERIFIABLE

Article from Issue 118/2010
Author(s):

How to avoid malicious code on Linux.

Although it doesn’t happen often, occasionally, an attacker breaks in to a server and manages to modify source code or binary packages that people install on their machines. This happened recently, well actually not that recently, when an attacker broke in and replaced the file Unreal3.​​2.8.1​.tar.gz with one that contains a back door in the DEBUG3_DOLOG_SYSTEM macro.

Buy this article as PDF

Download Article PDF now with Express Checkout
Price $2.95
(incl. VAT)

Buy Linux Magazine

Related content

comments powered by Disqus