Signed, sealed, and delivered

VERIFIABLE

Article from Issue 118/2010
Author(s):

How to avoid malicious code on Linux.

Although it doesn’t happen often, occasionally, an attacker breaks in to a server and manages to modify source code or binary packages that people install on their machines. This happened recently, well actually not that recently, when an attacker broke in and replaced the file Unreal3.​​2.8.1​.tar.gz with one that contains a back door in the DEBUG3_DOLOG_SYSTEM macro.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

comments powered by Disqus