|Inquire about this domain|
UNIX, Linux, BSD, Unix Security, Server Security, Securing Linux, Web Server, MySQL, PHP, Apache at uix.com
|Page: 17 of 100 pages.||
Date: Wed, 25. February 2009 11:00:00
InfoWorld - Linux certainly has established itself as a prominent server OS these days, pushing Unix into the background. But the open source OS shares the stage with commercial software giant Microsoft, which remains a dominant player with Windows Server.
Date: Wed, 24. September 2008 10:00:00
InfoWorld - Linux is enjoying growth, with a contingent of devotees too large to be called a cult following at this point. Solaris, meanwhile, has thrived as a longstanding, primary Unix platform geared to enterprises. But with Linux the object of all the buzz in the industry, can Sun's rival Solaris Unix OS hang on, or is it destined to be displaced by Linux altogether?
Date: Tue, 25. August 2009 18:17:43
SCO Group, whose six-year-old legal case arguing Linux infringes its Unix copyright won an appeal which overturned a ruling that Novell owned Unix copyrights - and paves the way for a trial. SCO Group, whose six-year-old legal case arguing Linux infringes its Unix copyright hasn't been enough to keep...
Date: Tue, 29. September 2009 10:00:00
InfoWorld - In a twist of irony, the Unix platform celebrates its 40th birthday this year, as does the man whose work probably has done more to diminish the trendiness of Unix than anyone else: Linux founder Linus Torvalds.
Date: Mon, 12. July 2010 15:05:13
walterbyrd writes "SCO's ex-CEO's brother, a lawyer named Kevin McBride, has finally revealed some of the UNIX code that SCO claimed was copied into Linux. Scroll down to the comments where it reads: 'SCO submitted a very material amount of literal copying from UNIX to Linux in the SCO v. IBM case. For example, see the following excerpts from SCO's evidence submission in Dec. 2005 in the SCO v. IBM case:' There are a number of links to PDF files containing UNIX code that SCO claimed was copied into Linux (until they lost the battle by losing ownership of UNIX)." Many of the snippets I looked at are pretty generic. Others, like this one (PDF), would require an extremely liberal view of the term "copy and paste."pa href="http://www.facebook.com/sharer.php?u=http%3A%2F%2Flinux.slashdot.org%2Fstory%2F10%2F07%2F11%2F2314254%2FClaimed-Proof-That-UNIX-Code-Was-Copied-Into-Linux" target="_blank" title="Share on Facebook"img src="http://a.fsdn.com/sd/facebook_icon_large.png"/a a href="http://twitter.com/home?status=Claimed+Proof+That+UNIX+Code+Was+Copied+Into+Linux%3A+http%3A%2F%2Fbit.ly%2FbDuBFF" target="_blank" title="Share on Twitter"img src="http://a.fsdn.com/sd/twitter_icon_large.png"/a/ppa href="http://linux.slashdot.org/story/10/07/11/2314254/Claimed-Proof-That-UNIX-Code-Was-Copied-Into-Linux?from=rss"Read more of this story/a at Slashdot./piframe src="http://slashdot.org/slashdot-it.pl?op=discussamp;id=1715668amp;smallembed=1" style="height: 300px; width: 100%; border: none;"/iframe pa href="http://feedads.g.doubleclick.net/~at/V2lwJ_QYCx2BVojnsdMOO4mmjPA/0/da"img src="http://feedads.g.doubleclick.net/~at/V2lwJ_QYCx2BVojnsdMOO4mmjPA/0/di" border="0" ismap="true"/img/abr/ a href="http://feedads.g.doubleclick.net/~at/V2lwJ_QYCx2BVojnsdMOO4mmjPA/1/da"img src="http://feedads.g.doubleclick.net/~at/V2lwJ_QYCx2BVojnsdMOO4mmjPA/1/di" border="0" ismap="true"/img/a/pimg src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/HaCJHZc69pI" height="1" width="1"/
Date: Wed, 8. May 2013 02:35:00
A stealthy malicious software program is taking hold in some of the most popular Web servers, and researchers still don't know why. Last week, security companies Eset and Sucuri found Apache servers infected with Linux/Cdorked. If that malware is running on a Web server, victims are redirected to another website that tries to compromise their computer. Eset said on Tuesday it has now found versions of Linux/Cdorked engineered for the Lighttpd and Nginx Web servers, both widely used across the Internet. Marc-Etienne M. Leveille of Eset wrote that the company has found 400 Web servers infected so far, of which 50 are ranked in Web analytics company Alexa's top 100,000 websites. To read this article in full or to leave a comment, please click here
Date: Tue, 1. December 2009 15:05:06
buchner.johannes writes "I was fed up with the general consensus that Linux is oh-so-secure and has no malware. After a week of work, I finished a package of malware for Unix/Linux. Its whole purpose is to help white-hat hackers point out that a Linux system can be turned into a botnet client by simply downloading BOINC and attaching it to a user account to help scientific projects. The malware does not exploit any security holes, only loose security configurations and mindless execution of unverified downloads. I tested it to be injected by a PHP script (even circumventing safe mode), so that the Web server runs it; I even got a proxy server that injects it into shell scripts and makefiles in tarballs on the fly, and adds onto Windows executables for execution in Wine. If executed by the user, the malware can persist itself in cron, bashrc and other files. The aim of the exercise was to provide a payload so security people can 'pwn' systems to show security holes, without doing harm (such as deleting files or disrupting normal operation). But now I am unsure of whether it is ethically OK to release this toolkit, which, by ripping out the BOINC payload and putting in something really evil, could be turned into proper Linux malware. On the one hand, the way it persists itself in autostart is really nasty, and that is not really a security hole that can be fixed. On the other hand, such a script can be written by anyone else too, and it would be useful to show people why you need SELinux on a server, and why verifying the source of downloads (checksums through trusted channels) is necessary. Technically, it is a nice piece, but should I release it? I don't want to turn the Linux desktop into Windows, hence I'm slightly leaning towards not releasing it. What does your ethics say about releasing such grayware?"pa href="http://ask.slashdot.org/story/09/12/01/0025213/Ethics-of-Releasing-Non-Malicious-Linux-Malware?from=rss"img src="http://slashdot.org/slashdot-it.pl?from=rssamp;op=imageamp;style=h0amp;sid=09/12/01/0025213"/a/ppa href="http://ask.slashdot.org/story/09/12/01/0025213/Ethics-of-Releasing-Non-Malicious-Linux-Malware?from=rss"Read more of this story/a at Slashdot./p pa href="http://feedads.g.doubleclick.net/~at/xuZFoYuENdCmNOgPwo-3_aSn6Mk/0/da"img src="http://feedads.g.doubleclick.net/~at/xuZFoYuENdCmNOgPwo-3_aSn6Mk/0/di" border="0" ismap="true"/img/abr/ a href="http://feedads.g.doubleclick.net/~at/xuZFoYuENdCmNOgPwo-3_aSn6Mk/1/da"img src="http://feedads.g.doubleclick.net/~at/xuZFoYuENdCmNOgPwo-3_aSn6Mk/1/di" border="0" ismap="true"/img/a/pimg src="http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/v8PcuvLeaN8" height="1" width="1"/
Date: Fri, 22. May 2009 13:57:37
Microsoft's new entry-level server edition is aimed squarely at Linux, and the software giant says its "simplicity" is expected to give it the edge over Linux as the choice server OS for the small business segment. SINGAPORE--Microsoft's new entry-level server edition, Windows Server 2008 Foundation, is aimed squarely at...
Date: Sat, 30. March 2013 12:52:00
A flaw in the widely used BIND DNS (Domain Name System) software can be exploited by remote attackers to crash DNS servers and affect the operation of other programs running on the same machines. The flaw stems from the way regular expressions are processed by the libdns library that's part of the BIND software distribution. BIND versions 9.7.x, 9.8.0 up to 9.8.5b1 and 9.9.0 up to 9.9.3b1 for UNIX-like systems are vulnerable, according to a security advisory published Tuesday by the Internet Systems Consortium (ISC), a nonprofit corporation that develops and maintains the software. The Windows versions of BIND are not affected. BIND is by far the most widely used DNS server software on the Internet. It is the de facto standard DNS software for many UNIX-like systems, including Linux, Solaris, various BSD variants and Mac OS X. Attack can crash servers The vulnerability can be exploited by sending specifically crafted requests to vulnerable installations of BIND that would cause the DNS server process?the name daemon, known as "named"?to consume excessive memory resources. This can result in the DNS server process crashing and the operation of other programs being severely affected. To read this article in full or to leave a comment, please click here
Date: Fri, 26. September 2008 15:05:24
JerkBoB links to a story at the New York Times about the future prospects of Sun's Solaris, excerpting: "Linux is enjoying growth, with a contingent of devotees too large to be called a cult following at this point. Solaris, meanwhile, has thrived as a longstanding, primary Unix platform geared to enterprises. But with Linux the object of all the buzz in the industry, can Sun's rival Solaris Unix OS hang on, or is it destined to be displaced by Linux altogether?"Read more of this story at Slashdot.
|Page: 17 of 100 pages.||